Hardening Basics Part 2 TryHackme
By Shamsher khna This is a Writeup of Tryhackme room “Hardening Basics Part 2”
Task 2: Chapter 3 Quiz
Question 1. Which SSH Protocol version is the most secure?
Question 2. This is a random, arbitrary number, used as the session key, that is used to encrypt GPG.
Question 3. Yey/Ney — GPG is based off of the OpenGPG standard
Question 4. What is the command to generate your GPG keys?
Answer: gpg — gen-key
Question 5. What is the command to symmetrically encrypt a file with GPG?
Answer: gpg -c
Question 6. What is the command to asymmetrically encrypt a file with GPG?
Answer: gpg -e
Question 7. What is the command to create SSH keys?
Question 8. Where are ssh keys stored in a user’s home directory?
Question 9. What option needs to be set to select the type of key to generate for SSH?
Question 10. The SSH configuration options presented in this chapter were found in what file (full path)?
Task 13: Chapter 4 Quiz
Question 1. Where are the AppArmor profiles located?
Question 2. This directory includes partial profiles to be used in your own custom profiles
Question 3. This punctuation mark is REQUIRED at the end of every rule in a profile
Question 4. This AppArmor mode enforces the profiles but also logs them
Question 5. This command checks the status of AppArmor
Please Follow on LinkedIn Twitter
Written by Shamsher khan
For more walkthroughs stay tuned…
Before you go…
Visit my other walkthrough’s:-
and thank you for taking the time to read my walkthrough.
If you found it helpful, please hit the 👏 button 👏 (up to 40x) and share
it to help others with similar interests! + Feedback is always welcome!