Search Skills | TryHackMe — Writeup

Jynxx
1 min readNov 4, 2024

--

Task 2

What do you call a cryptographic method or product considered bogus or fraudulent?

Snake oil

.

What is the name of the command replacing netstat in Linux systems?

ss

Task 3

How would you limit your Google search to PDF files containing the terms cyber warfare report?

filetype:pdf cyber warfare report

.

What phrase does the Linux command ss stand for?

socket statistics

Task 4

What is the top country with lighttpd servers?

United States

.

What does BitDefenderFalx detect the file with the hash 2de70ca737c1f4602517c555ddd54165432cf231ffc0e21fb2e23b9dd14e7fb4 as?

Android.Riskware.Agent.LHH

Task 5

What utility does CVE-2024–3094 refer to?

xz

Task 6

What does the Linux command cat stand for?

concatenate

.

What is the netstat parameter in MS Windows that displays the executable associated with each active connection and listening port?

-b

Task 7

You are hired to evaluate the security of a particular company. What is a popular social media website you would use to learn about the technical background of one of their employees?

LinkedIn

.

Continuing with the previous scenario, you are trying to find the answer to the secret question, “Which school did you go to as a child?”. What social media website would you consider checking to find the answer to such secret questions?

Facebook

--

--

No responses yet