Introduction to Offensive Security: Operating System Security
In this article, I will write a write-up for Operating System Security that covers an Introduction to Operating System Security, Common Examples of OS Security, and Practical Examples of OS Security.
Which of the following is not an operating system?
Thunderbird
AIX
Android
Chrome OS
Solaris
Thunderbird
Which of the following is a strong password, in your opinion?
LearnM00r
iloveyou
1q2w3e4r5t
LearnM00r
qwertyuiop
Based on the top 7 passwords, let’s try to find Johnny’s password. What is the password for the user
J**ohnny**
?abc123
Once you are logged in as Johnny, use the command
history
to check the commands that Johnny has typed. We expect Johnny to have mistakenly typed theroot
password instead of a command. What is the root password?happyHack!NG
While logged in as Johnny, use the command
su - root
to switch to theroot
account. Display the contents of the fileflag.txt
in theroot
directory. What is the content of the file?THM{YouGotRoot}
Thank you for reading my article. Please leave any questions or comments on improving my learning journey and the Lab THM challenges. We can also connect more on LinkedIn or X.
Subscribe to my newsletter
Read articles from J3bitok directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
J3bitok
J3bitok
Software Developer Learning Cloud and Cybersecurity Open for roles * If you're in the early stages of your career in software development (student or still looking for an entry-level role) and in need of mentorship you can book a session with me on Mentorlst.com.