Linux Fundamentals ๐ŸŒŸ Part - 1

V. LeelaV. Leela
30 min read

TASK - 1:

Linux is an operating system such as Mac or Windows. It runs upon phones, cars, and computers. Many other things make it run also.

โšกThings we will learn about Linux:

  1. In your own browser, ๐Ÿ’ป try out your first Linux commands now.

  2. In order to locate files ๐Ÿ“‚ as well as move around, one must learn basic commands.

  3. View how files get searched using simple tricks. ๐Ÿง 

TASK - 2:

Linux is Everywhere! ๐ŸŒ, You may not see it, but you probably use Linux every day. Here are some places where Linux runs:

  1. ๐ŸŒ Websites: Google/Facebook servers run Linux.

  2. ๐Ÿš— Cars: Infotainment & dashboards use Linux.

  3. ๐Ÿช Stores: Checkout machines & POS systems.

  4. ๐Ÿšฆ Traffic: Smart signals & sensors.

Flavours of Linux:

Just like Windows has versions (7, 8, 10), Linux also has many versions called โ€œdistrosโ€ ๐Ÿท๏ธ.

  • Ubuntu Server can run on systems with only 512MB of RAM!

  • Popular ones are Ubuntu and Debian.

  • You can use them for websites or as a regular computer.

TASK - 3:

  • For now, press "Start Machine" where you will be able to interact with your own Linux machine within your browser whilst following along with this room:

Task - 4:

  • Ubuntu is lightweight and can run on old computers, but sometimes it doesnโ€™t have a GUI. Instead, you use the Terminal ๐Ÿ–ฅ๏ธ a text-only window for typing commands.

At first, the terminal looks a bit scary, but with practice, it gets easy!

Command ๐Ÿ–ฅ๏ธDescription.
Echo ๐Ÿ“ขOutput any text that we provide.
Whoami ๐Ÿ‘คFind out what user we're currently logged in as!

Task - 5:

Interacting With the Filesystem:

COMMANDFull Name
1) lsListing
2) cdChange Directory
3) catConcatenate
4) pwdPrint Working Directory
  • Listing Files(ls):

Type โ€œlsโ€ and press Enter! ๐Ÿ”. It shows everything in your folder ๐Ÿ“‚.

  • Change Directory(cd):

    Now that you can see folders with ls ๐Ÿ‘€, use cd (change directory) to move inside them. For example, type cd Pictures to enter your photos folder ๐Ÿ“ธ. Once inside, use ls again to view its contents ๐Ÿ–ผ๏ธ.

  • Concatenate(cat):

    Use the cat command ๐Ÿฑ - just type cat filename (like cat notes.txt) to display the file's contents right in your terminal ๐Ÿ“„. It works for text files, configs, and more! After listing files with ls, pick one and cat it to see inside ๐Ÿ”.

  • Print Working Directory(pwd):

    Your terminal shows your current folder ๐Ÿ“‚. pwd (print working directory) it prints your **exact location (**like /home/user/Documents).

Task - 6:

  1. Using Find:

The find command ๐Ÿ” is incredibly useful for locating files - whether you need a simple search or something more advanced. Let's start with the basics. First, use ls to view your current directories ๐Ÿ“‚. When you need to find a specific file (like "passwords.txt") but can't remember its location ๐Ÿค”, simply use find โ€œ-name passwords.txtโ€ ๐Ÿ•ต๏ธ. This handy command will search through all folders in your current directory to find that file for you.

  1. Using Grep:

When dealing with large files like logs ๐Ÿ“„, cat isn't efficient - imagine searching 244 entries manually! Instead, use grep ๐Ÿ” to find specific content fast. For example, to find all visits from IP "81.143.211.90" in a web server's access log:

Task - 7:

SYMBOL/OPERATORDESCRIPTION
1) &This operator allows you to run commands in the background of your terminal.
2) &&This operator allows you to combine multiple commands together in one line of your terminal.
3) >This operator is a redirector - meaning that we can take the output from a command (such as using cat to output a file) and direct it elsewhere.
4) ยปThis operator does the same function of the > operator but appends the output rather than replacing (meaning nothing is overwritten).

  • Task Completion of Linux Fundamentals Part - 1


Linux Modules ๐Ÿง 

Task - 1:

This room is your terminal practice playground ๐Ÿง - Focus on learning! We'll cover essential tools like grep ๐Ÿ”, awk โœ‚๏ธ, sed ๐Ÿ–Š๏ธ, curl ๐ŸŒ, and more to boost your command-line efficiency. Instead of reading lengthy manuals, you'll learn hands-on with practical examples ๐Ÿ’ก.

Task -2:

  • โ€œduโ€ is a command in Linux which helps you identify what files/directories ๐Ÿ“‚ are consuming how much space.

Important Flags: -

FLAGDESCRIPTION
-aWill list files as well with the folder.
-hWill list the file sizes in human readable format(B,MB,KB,GB)
\=cUsing this flag will print the total size at the end. Jic you want to find the size of directory you were enumerating
-dFlag to specify the depth-ness of a directory you want to view the results for (eg. -d 2)
--timeTo get the results with time stamp of last modified.

Example:

  1. โ€du -a /home/โ€ - will list every file in the /home/ directory with their sizes in KB.

  2. โ€œdu -a /home/ | grep โ€œ- user will list any file/directory whose name is containing the string "user" in it.

Final Word:

  • du --time -d 1

Task - 3:

FLAGSDESCRIPTION
-RDoes a recursive grep search for the files inside the folders (if found in the specified path for pattern search; else grep won't traverse directory for searching the pattern you specify)
-hIf you're grepping recursively in a directory, this flag disables the prefixing of filenames in the results.
-cThis flag won't list you the pattern only list an integer value, that how many times the pattern was found in the file/folder.
-iI prefer to use this flag most of the time; this is what specifies grep to search for the PATTERN while IGNORING the case
-lwill only list the filename instead of pattern found in it.
-nIt will list the lines with their line number in the file containing the pattern.
-vThis flag prints all the lines that are NOT containing the pattern.
-EThis flag we already read above... will consider the PATTERN as a regular expression to find the matching strings.
-eThe official documentation says, it can be used to specify multiple patterns and if any string matches with the pattern(s) it will list it.
  • grep -E functions same as egrep and grep -F functions same as fgrep.

Task - 4:

Youโ€™ve used grep ๐Ÿ” now things get more powerful. String manipulation (strops) lets you slice โœ‚๏ธ, filter ๐Ÿงน, and transform ๐Ÿ”„ text like a pro.

Tools for the string manipulation:

  1. tr ๐Ÿ”„ โ€“ Swap/delete characters. (Example: Change a-z โ†’ A-Z in seconds โฑ๏ธ)

  2. awk ๐Ÿฆ… โ€“ Text processing powerhouse. (Example: Print column #2 from a CSV ๐Ÿ“‘)

  3. sed โœ๏ธ โ€“ Edit text on the fly. (Example: Replace "error" with "fixed" globally ๐Ÿ”ง)

  4. xargs ๐Ÿ—๏ธ โ€“ Turn text into command fuel.

Other Commands :

  1. sort ๐Ÿ”  โ€“ Alphabetize chaos.

  2. uniq ๐ŸงŠ โ€“ Nuke duplicates.

Task - 5:

FLAGSDESCRIPTION
-dTo delete a given set of characters.
-tTo concat source set with destination set(destination set comes first; t stands for truncate).
-sTo replace the source set with the destination set(s stands for squeeze).
-cThis is the REVERSE card in this game, for eg. If you specify -c with -d to delete a set of characters then it will delete the rest of the characters leaving the source set which we specified (c stands for complement; as in doing reverse of something).

Example : "cat file.txt | tr -s '[:lower:]' '[:upper:]โ€™ โ€

  • โ€œtr --helpโ€ command Helps in the various commands.

Task - 6:

  • Syntax: awk [flags] [select pattern/find(sort)/commands] [input file]

  • Awk is acripting language used for manipulating data ๐Ÿ“‚and generating reports. The awk command programming language requires no compiling, ๐Ÿ’ก and allows the user to use variables, numeric functions, string functions, and logical operators."

Important Flags

FLAGSDESCRIPTION
-FWith this flag you can specify FIELD SEPARATOR (FS), and thus don't need to use the BEGIN rule
-vCan be used to specify variables (like we did in BEGIN{OFS=":"}
-DYou can debug your. awk scripts specifying this flag(awk -D script.awk)
-oTo specify the output file (if no name is given after the flag, the output is defaulted to (awkprof.out)
  1. Using AWK:
  • To simply print a file with awk.

    • To search for a pattern inside a file you enclose the pattern in forward slashes /pattern/ . For instance, if I want to know who all plays CTF competitions the command should be like: โ€œ awk '/ctf/' file.txtโ€.

  1. Built-In variables in AWK:
  • Built-in variables include field variables ($1, $2, $3 .. $n). These field variables are used to specify a piece of data (. If I run โ€œawk '{print $1 $3}' file.txt โ€œ. it will list me the words that are at 1st and 3rd fields.

    1. More on variables":

      • NR: (Number Record) is the variable that keeps count of the rows after each line's execution... You can use NR command to number the lines (awk '{print NR,$0}' file.txt). Note that awk considers rows as records.

        • FS: (Field Separator) is the variable to set in case you want to define the field for input stream. The field separation can be altered to whatever you want while specifying the pattern. FS can be defined to another character(s)(yea, can be plural) at the BEGIN {command}.

          Ex:- โ€œawk "BEGIN {FS='o'} {print $1,$3} END{print 'Total Rows=',NR}"

  • RS: (Record Separator): By default, it separate rows with '\n'.

  • OFS: (Output Field Separator) You must have gathered some idea by the full form, it is to specify a delimeter while outputing.

  • ORS: (Output Record Separator)

Task - 7:

The sed life: There are endless ways of using sed.

sed -e '1,3 s/john/JOHN/g' file.txt
  • 1,3 = Only lines 1 through 3 ๐Ÿ“

  • s = Substitute command ๐Ÿ”„

  • john = Text to find ๐Ÿ”Ž

  • JOHN = Replacement text โœ๏ธ

  • g = Replace ALL matches (not just first) ๐Ÿ’ฅ

Syntax: sed [flags] [pattern/script] [input file]

Important Flags:

FLAGSDESCRIPTION
-eTo add a script/command that needs to be executed with the pattern/script(on searching for pattern).
-fSpecify the file containing string pattern.
-EUse extended regular expressions.
-nSuppress the automatic printing or pattern spacing.

Modes/Commands:

COMMANDSDESCRIPTION
S(Most used) Substitute mode (find and replace mode)
YWorks same as substitution; the only difference is, it works on individual bytes in the string provided (this mode takes no arguments/conditions)

Args:

FLAGS/ARGSDESCRIPTION
/gglobally (any pattern change will be affected globally, i.e. throughout the text; generally, works with s mode).
/iTo make the pattern search case-insensitive (can be combined with other flags).
/dTo delete the pattern found (Deletes the whole line; takes no parameter like conditions/modes/to-be-replaced string)
/pprints the matching pattern (a duplicate will occur in output if not suppressed with -n flag.).
/1,/2,/3../nTo perform an operation on an nth occurrence in a line (works with s mode).
  • Range of lines:

  • Viewing the entire file except a given range

  • Viewing multiple ranges of lines inside a file

  • To start searching from nth pattern occurrence in a line you can use combination of /g with /1,/2,/3.

  • If you have log files to view which have trailing white spaces, and it is hard to read them, then you can fix that using regex.

Task - 8:

  • xargs turns text into command arguments! ๐ŸŽฏ Pipe input to it (like echo "a b c" | xargs mkdir โžก๏ธ creates folders a, b, c ๐Ÿ“). Handles spaces/splitting automatically โœจ. Use -n to limit args per call. CLI magic! โšก
FLAGSDESCRIPTION
-0Will terminate the arguments with null character (helps to handle spaces in the argument)
-a fileThis option allows xargs to read item from a file
-d delimiterTo specify the delimiter to be used when differentiating arguments in stdin
-L intSpecifies max number non-blank inputs per command line.
-s intConsider this as a buffer size that you allocate while running xargs, it sets the max-chars for the command, which includes its initial arguments and terminating nulls as well. (You won't be using this most of the times but it's good to know). Default size is around 128kB (if not specified).
-xThis flag will exit the command execution if the size specified is exceeded. (For security purposes.)
-E strThis is to specify the end-of-file string (You can use this in case you are reading arguments from a file)
-l str(Capital i) Used to replace str occurrence in arguments with the one passed via stdin(More like creating a variable to use later)
-pprompt the user before running any command as a token of confirmation.
-rIf the standard input is blank (i.e. no arguments passed) then it won't run the command.
-n intThis specifies the limit of max-args to be taken from command input at once. After the max-args limit is reached, it will pass the rest arguments into a new command line with the same flags issued to the previously ran command. (More like a looping)
-tverbose; (Print the command before running it).Note: This won't ask for a prompt
  • What if we want to run multiple command with xargs in one line.

  • You can use xargs with conjunction to find command to enhance the search results.

Note: The find command prints results to standard output by default, so the -print option is normally not needed, but -print0 separates the filenames with a \0 (NULL) byte so that names containing spaces or newlines can be interpreted correctly.

  • You can use xargs command to grep a text from any file in any directory meeting a specific pattern/criteria.

Task - 9:

Uniq Command:

The โ€œuniqโ€ command filters out duplicate lines from a file or stdin, but it only works on adjacent duplicates. To effectively use it, first sort the lines. This combo reduces clutter and simplifies searching! ๐Ÿ“„โœจ

sort file.txt | uniq

Sort Command:

The sort command organizes lines alphabetically or numerically with ease. Simply pipe your stdin into it, and it will handle the sorting for you! ๐Ÿ“Šโœจ

Important Flags for Uniq:

FLAGSDESCRIPTION
-cTo count the occurrences of every line in file or stdin
-dWill only print the lines that are repeated, not the one which are unique
-iIgnores case(Default is case-sensitive)
-uWill only print lines that are already uniq.

Important Flags for Sort:

FLAGSDESCRIPTION
-rSorts in reverse order
-cThis flag is used to check whether the file is already sorted or not(If not, it will list, where the disorder started)
-uTo sort and removes duplicate lines(does work same as stdin redirected into uniq)
-o save.txtTo save into a output file
  • sort command, as the name suggests sorts the lines alphabetically and numerically, automatically. All you got to do is pipe the stdin into sort command.

Task - 10:

cURL (short for "crawl URL") fetches webpage data in raw format, letting you perform browser tasks in the terminal. ๐Ÿ–ฅ๏ธ.You can't save cat pictures directly from Google, but with some grepping, you can! ๐ŸฑUse cURL to download large files or create offline copies easily. Just curl the URL and go! ๐ŸŒ๐Ÿš€

Syntax: curl https://google.com/

Important Flags:

FLAGSDESCRIPTION
-#Will display a progress meter for you to know how much the download has progressed.(or use --silent flag for a silent crawl)
-oSaves the file downloaded with the name given following the flag.
-OSaves the file with the name it was saved on the server.
-c -This flag can resume your broken download without specifying an offset.
--limit-rateLimits the download/upload rate to somewhere near the specified range (Units in 100K,100M,100G)
-uProvides user authentication (Format: -u user:password)
-THelps in uploading the file to some server(In our case php-reverse-shell)
-xIf you have to view the page through a PROXY. You can specify the proxy server with this flag. (-x proxy.server.com -u user:password(Authentication for proxy server))
-I(Caps i) Queries the header and not the webpage.
-AYou can specify user agent to make request to the server
-LTells curl to follow redirects
-bThis flag allows you to specify cookies while making a curl request(Cookie should be in the format "NAME1=VALUE1;NAME2=VALUE2")
-dThis flag can be used to POST data to the server(generally used for posting form data).
-XTo specify the HTTP method on the URL. (GET,POST,TRACE,OPTIONS)
  • Continuing a download:

  • Saving the file with the name it was saved on the server.

Task - 11:

Syntax: โ€œwget protocol://url.com/ โ€œ

Important Flags:

FLAGSDESCRIPTION
-bTo background the downloading process
-cTo continue to the partially downloaded file (It will look for the partially downloaded file in the directory and starts appending; takes no argument)
-t intTo specify retries to the URL
-O download.txtTo specify the output name of downloaded file
-o fileTo overwrite the logs into another file
-a fileTo append the logs into already existing file without deleting previous contents
-i fileRead the list of URLs from a file.
--user=usernameTo give a login username(Use --ftp-user and --http-user if doesn't work)
--password=passwordTo give a login password( Use --ftp-password and --http-password if doesn't work)
--ask-passwordAsk for a password prompt if a login is necessary. (I recommend using this flag instead of --password because there are chances that password might start with $ or something else that can be interpreted as something else in your terminal)
--limit-rate=10kSimilarly to curl(supports k and m notation for kB and mB respectively)
-w=<int>This is to specify the waiting time before the retrieval from a URL.(Takes time in seconds)
-T=<int>Timeout the retrieval after a specified amount of time.(Takes time in seconds)
-NEnables timestamping
-UTo specify the user-agent while downloading the file
  • Downloading a file with different name

  • specifying logfile as log.txt with timestamping enabled

Task - 12:

โ€œxxdโ€ is a handy tool for creating and reversing hexdumps. ๐Ÿ’ป๐Ÿ”„ It's great for handling hex strings, whether you're into CTFs or automating JWT bypasses. Use it with files or pipe input directly! โšก๏ธ๐Ÿ› ๏ธ

Important Flags:

FLAGDESCRIPTION
-bwill give binary representation instead of hexdump
-EChange the character encoding in the right hand column from ASCII to EBCDIC (Feel free to leave this flag if you don't know about BCD notation)
-c intSets the number of bytes to be represented in one row. (i.e. setting the column size in bytes; Default to 16)
-gThis flag is to set how many bytes/octets should be in a group i.e. separated by a whitespace (default to 2 bytes; Set -g0 if no space is needed).
-iTo output the hexdump in C include format ('0xff' integers)
-lSpecify the length of output(if the string is bigger than the length specified, hex of the rest of the string will not be printed)
-pSecond most used flag; Converts the string passed into plain hexdump style(continuous string of hex bytes)
-rMost used flag, will revert the hexdump to binary(Interpreted as plain text).
-uUse uppercase hex letters(default is lower case)
  • Use of -E flag (For curious minds)

  • Output in binary and C include format

  • Specifying a length

  • Seeking an offset

  • Seeking at offset from the end of the file.

  • here is a difference between -s +offset and -s offset while seeking through stdin.

Task -13:

GPG & Encryption Commands ๐Ÿ”:

An open-source encryption tool, different from PGP (Pretty Good Privacy). GPG uses AES by default.

Tar Command ๐Ÿ“ฆ:

Use tar for encrypting/decrypting gzip or bzip archives. Check the man page for details: man tar.

  1. ID/PWD/UNAME Commands ๐Ÿ†”: Essential commands for user info after gaining shell access.

  2. PS/KILL Commands โš”๏ธ: List and kill processes using PID. Learn more about โ€œpsโ€here.

  3. Netstat Command ๐ŸŒ: Lists network activity, open ports, and connections. An alternative is the ss command for real-time port activity.

  4. Less/More Commands ๐Ÿ“–

  • More: Older command with limited backward scrolling.

  • Less: Improved version with better navigation and search options.

  • Most: Another alternative, install with sudo apt install most.

Diff Command ๐Ÿ”:

pares two files byte-by-byte. For line-by-line comparison, use the comm command.

  • base64 command

  • tee command

  • file/stat commands

Export Command ๐ŸŒ:

Use the export command to set environment variables for your shell session.

Reset Command ๐Ÿ”„:

If your terminal is acting up, just type reset to restore it to normal without closing the shell.

systemctl/Service Command โš™๏ธ:

Service Command: Initializes services in /etc/init.d without major system changes. Systemctl: A more powerful command for managing services with systemd, but be cautious as it affects system settings.

Linux Modules Task Completion :


Windows Fundamentals 1

Task - 1:

Task - 2:

The Evolution of Windows OS ๐Ÿ–ฅ๏ธ๐ŸชŸ Since its launch in 1985, Windows has ruled homes and businesses but also attracted hackers ๐Ÿฑโ€๐Ÿ’ป.

Windows XP was loved โค๏ธ, but Windows Vista struggled and was quickly replaced. When XP support ended, many rushed to Windows 7, causing a compatibility scramble โณโš™๏ธ.

After Windows 7, Windows 8.x had a short run, then came the solid Windows 10. Now, Windows 11 is here with Home and Pro editions, bringing new features and better security ๐Ÿ”โœจ.

For servers, the latest is Windows Server 2025 ๐Ÿ–ฅ๏ธ๐Ÿ›ก๏ธ. Microsoft keeps improving despite criticism.

Note: The attached VM uses Windows Server 2019 Standard ๐Ÿ–ฅ๏ธ.

Update: Windows 10 support runs until Oct 14, 2025, ๐Ÿ“…, and Windows 11 launched Oct 5, 2021 ๐ŸŽ‰.

Stay updated with Windows! ๐Ÿš€

Task - 3:

Exploring the Windows 10 Desktop ๐Ÿ–ฅ๏ธโœจ

The Windows Desktop, also known as the graphical user interface (GUI), is your welcome screen after logging into a Windows 10 machine. First, youโ€™ll encounter the login screen, where you enter your username and password ๐Ÿ”‘.

Key Components of the Windows Desktop:

  1. The Desktop: This is your workspace, filled with shortcuts to programs, folders, and files. You can organize these icons or let them scatter randomly for quick access. Right-clicking on the desktop opens a menu to change icon sizes, arrange them, or personalize your wallpaper ๐ŸŽจ.

  2. The Start Menu: Accessed by clicking the Windows logo, the Start Menu provides shortcuts to apps, files, and settings. Itโ€™s divided into sections for quick actions, recently added apps, and installed programs. You can pin your favorite apps for easy access ๐Ÿ“‚.

  3. The Taskbar: This is where all your open apps appear. Hovering over an icon shows a preview, helping you find the right window. You can customize the taskbar by right-clicking to enable or disable components ๐Ÿ› ๏ธ.

  4. The Notification Area: Located at the bottom right, this area displays the date, time, and icons for volume and network status. You can customize which icons appear here through Taskbar settings โฐ๐Ÿ””.

With these features, Windows 10 offers a user-friendly experience, making it easy to navigate and customize your desktop environment. ๐Ÿš€

Task - 4:

Understanding NTFS in Windows ๐Ÿ–ฅ๏ธ๐Ÿ“

The modern Windows file system is NTFS (New Technology File System), which replaced older systems like FAT16/FAT32 and HPFS. While FAT is still common in USB drives and MicroSD cards, NTFS is the go-to for Windows installations.

Key Features of NTFS:

  1. Journaling: Automatically repairs files in case of failure using a log file ๐Ÿ“œ.

  2. File Size Support: Handles files larger than 4GB ๐Ÿ“.

  3. Permissions: Set specific access rights for files and folders,

  4. including: Full control Modify Read & Execute List folder contents Read Write ๐Ÿ”’ To check your drive's file system, right-click the C drive and select Properties.

Alternate Data Streams (ADS) ๐ŸŒŠ NTFS allows files to have multiple data streams through ADS. While Windows Explorer doesnโ€™t show these, you can use PowerShell to view them. ADS can be used for both legitimate purposes and malicious activities, like hiding malware.

Task - 5:

The Windows Folder: C:\Windows ๐Ÿ—‚๏ธ๐Ÿ’ป

The Windows folder (C:\Windows) is where the Windows operating system is stored, but it doesn't have to be on the C drive. It can exist on any drive or even in a different folder.

Environment Variables ๐ŸŒ The system environment variable for the Windows directory is %windir%. Environment variables store important information about the operating system, such as paths, processor details, and temporary folder locations.

Inside the Windows folder, you'll find several important subfolders, including System32.

The System32 Folder โš ๏ธ The System32 folder contains critical files essential for the OS to function. Be very careful when interacting with this folder, as deleting files here can make Windows inoperable.

Many tools you'll learn about in the Windows Fundamentals series are located in the System32 folder.

Task - 6:

User Accounts in Windows: Administrator vs. Standard User ๐Ÿ‘ค๐Ÿ”‘

In a typical Windows system, user accounts can be either Administrator or Standard User. The type of account determines what actions the user can perform.

Account Types:

  • Administrator: Can make system changes, add or delete users, modify settings, and more.

  • Standard User: Can only modify personal files and folders, with no permission to install programs or make system-level changes.

  • You are currently logged in as an Administrator. To view existing user accounts, click the Start Menu and type "Other User" to access System Settings > Other users.

  • Managing User Accounts โš™๏ธ: As an Administrator, you can add users. Standard Users wonโ€™t see this option. Clicking on a local user account will show options like Change account type and Remove.

When a new user logs in for the first time, their profile is created in C:\Users (e.g., C:\Users\Max). During this process, messages like "User Profile Service" will appear on the login screen. Each user profile includes standard folders such as:

Desktop Documents Downloads Music Pictures Local User and Group Management ๐Ÿ› ๏ธ For more detailed management, right-click the Start Menu, select Run, and type โ€œlusrmgr.mscโ€. This opens Local User and Group Management, where you can see Users and Groups.

Task - 7:

What is User Account Control (UAC)? ๐Ÿ–ฅ๏ธ๐Ÿ›ก๏ธ

Many Windows users are logged in as local administrators, which means they can change system settings. But running with full admin rights all the time is risky because malware can easily infect the system.

UAC helps protect your PC by asking permission when a program needs higher privileges.

How UAC Works ๐Ÿ”?

  • When you log in as an administrator, your session runs with normal rights by default.

  • If a program wants to make big changes (like install software), UAC shows a prompt asking for permission.

  • This prompt appears with a shield icon on the program.

Important to Know โš ๏ธ

  • The built-in administrator account skips UAC prompts. Standard users see the shield icon and must enter admin credentials to proceed.

  • Try It Yourself ๐Ÿ‘จโ€๐Ÿ’ป Log in as a standard user and try to install a program. Youโ€™ll see the shield icon and get a UAC prompt asking for the admin password. If you donโ€™t enter it, the install wonโ€™t start.

  • UAC keeps your PC safer by making sure you agree before important changes happen! ๐Ÿ”โœจ

Task - 8:

Windows Settings vs Control Panel ๐Ÿ–ฅ๏ธโš™๏ธ

Windows has two main places to change system settings:

  • Settings Menu: Newer and easier to use, found in Windows 8 and 10.

  • Control Panel: Older, with more advanced options. How to Access ๐Ÿ—‚๏ธ Both can be opened from the Start Menu.

Quick Example ๐Ÿ”ง

Go to Settings > Network & Internet > Change adapter options.

  • It takes you to the Control Panel for more options.

  • Tips ๐Ÿ” If unsure, just search for what you want (like โ€œwallpaperโ€) in the Start Menu. It will help you open the right place.

Task - 9:

Exploring Task Manager in Windows ๐Ÿ–ฅ๏ธ๐Ÿ“Š

The Task Manager is a powerful tool that shows you what applications and processes are currently running on your system. It also provides insights into CPU and RAM usage under the Performance tab.

How to Access Task Manager ๐Ÿ—‚๏ธ

  • Right-click the taskbar to open Task Manager.

  • Views in Task Manager ๐Ÿ‘€ Simple View: Initially opens with limited information.

  • More Details: Click this to expand and see more data about running processes. For a deeper dive into Task Manager, check out the related blog post.

Windows Fundamentals 1 Task:


Windows Fundamentals 2

Task - 1:

Machine IP: MACHINE_IP

User: administrator

Password: letmein123!

Task - 2:

System Configuration Utility (MSConfig) in Windows ๐Ÿ› ๏ธ๐Ÿ”ง

The System Configuration utility (MSConfig) is designed for advanced troubleshooting, primarily to help diagnose startup issues.

How to Access MSConfig ๐Ÿ—‚๏ธ

You can launch MSConfig from the Start Menu. Note that you need local administrator rights to open it.

Tabs in MSConfig ๐Ÿ“‘ MSConfig has five tabs:

  • General: Choose how Windows loads (Normal, Diagnostic, or Selective).

  • Boot: Set various boot options for the operating system.

  • Services: Lists all services, whether running or stopped. Services run in the background. Startup: Not very useful in some VMs; Microsoft recommends using Task Manager for managing startup items.

  • Tools: Contains various utilities to further configure the operating system, with descriptions for each tool. Running Tools ๐Ÿ› ๏ธ In the Tools tab, you can launch utilities by using the command in the run prompt, command prompt, or by clicking the Launch button.

Task 3:

User Account Control (UAC) in MSConfig ๐Ÿ›ก๏ธ

In the System Configuration panel, you can adjust User Account Control (UAC) settings, which were discussed in detail in Windows Fundamentals 1.

Adjusting UAC Settings โš™๏ธ

  • You can change UAC settings or turn them off (not recommended).

  • Use the slider to see how different settings affect UAC.

Task - 4:

Computer Management (compmgmt) ๐Ÿ–ฅ๏ธ๐Ÿ”ง Sections:

System Tools Storage Services & Applications System Tools ๐Ÿ”

  • Task Scheduler: Automate tasks (run at login, schedule, etc.).

  • Event Viewer: See system events to troubleshoot.

  • Shared Folders: View and manage shared files and users.

  • Local Users & Groups: Manage users and groups.

  • Performance Monitor: Check system performance.

  • Device Manager: Manage hardware devices. Storage ๐Ÿ’พ

  • Disk Management: Manage drives, partitions, and letters.

    Services & Apps โš™๏ธ

  • Manage running services and view details.

  • WMI Control: Manage Windows system info (uses PowerShell now).

Task - 5:

System Information Tool (msinfo32) ๐Ÿ–ฅ๏ธ

โ“What is msinfo32?

Windows has a tool called System Information (msinfo32) that shows detailed info about your computerโ€™s hardware, components, and software environment.

๐Ÿ—‚๏ธMain Sections

  • Hardware Resources: Advanced info about your hardware.

  • Components: Info on devices like your display or keyboard.

  • Software Environment: OS software info and environment variables.

๐Ÿ› ๏ธEnvironment Variables

They store important system info, like where Windows is installed or the number of processors. You can also find them via Control Panel or Settings.

๐Ÿ”Try Searching!

At the bottom of msinfo32, use the search bar. Try searching for IP address under Components to see your network info.

Task - 6:

Discovering Resource Monitor (resmon) ๐Ÿ–ฅ๏ธ

What is Resource Monitor? ๐Ÿค”

Resource Monitor is a tool that shows how your computer is using resources like CPU, memory, disk, and network. It helps you see which programs are using these resources and can help you fix issues if something is not working right. ๐Ÿ› ๏ธ

Key Sections in Resource Monitor ๐Ÿ“Š

In the Overview tab, youโ€™ll find four main sections:

  1. CPU ๐Ÿ–ฅ๏ธ: Shows how much processing power is being used.

  2. Disk ๐Ÿ’พ: Displays disk usage and activity.

  3. Network ๐ŸŒ: Shows network activity and usage. Memory

  4. ๐Ÿง : Displays how memory is being used. Each section has its own tab at the top for more details!

Real-Time Graphs ๐Ÿ“ˆ On the right side, Resource Monitor has real-time graphs that show how your resources are being used right now. This helps you see whatโ€™s happening at a glance.

Note: What you see in Resource Monitor may look different from examples, as it depends on your computer's activity.

Task - 7:

Introduction to Command Prompt (cmd) ๐Ÿ–ฅ๏ธ

What is Command Prompt? ๐Ÿค”

The Command Prompt is a tool that lets you type commands to interact with your computer. Before graphical interfaces (like Windows), this was the main way to use a computer. Now, you can still use it for quick tasks! ๐Ÿ› ๏ธ

Easy Commands to Try ๐Ÿ“

Here are a couple of easy commands:

  • hostname: This shows your computer's name.

  • whoami: This tells you the name of the user currently logged in.

  • Helpful Commands for Troubleshooting ๐Ÿ”ง

Here are some commands that can help you fix issues:

  • ipconfig: This shows your network settings. To get help on any command, just add /?. For example, to see help for ipconfig, type:

1ipconfig

๐Ÿงน To clear the Command Prompt screen, type:

cls

  • Another useful command is netstat, which shows your network connections. You can run it by itself or add options like -a to see more details.

Managing Network Resources ๐ŸŒ

The net command helps you manage network settings. If you type net by itself, it will show you what you can do. To get help for a specific part, use:

1 net help [sub-command]

example:

1 net help user

Task - 8:

What is the Windows Registry? ๐Ÿ—„๏ธ

The Windows Registry is a database that stores important settings for your computer. It helps Windows work properly. ๐Ÿ˜Š

Whatโ€™s Inside? ๐Ÿ“‹

The registry contains:

User profiles Installed apps Folder and icon settings Hardware info Used ports Important Note

โš ๏ธ Warning: Only advanced users should change the registry, as it can affect your computer.

How to Access It ๐Ÿ–ฅ๏ธ Use the Registry Editor (regedit) to view or edit the registry.

Windows Fundamentals 2 Task Completion:


OverTheWire Bandit ๐ŸŽฎ

1๏ธโƒฃ Level 0 โ†’ Level 1

Log in with: ssh bandit0@bandit.labs.overthewire.org -p 2220
Find the password for bandit1 in the file readme in your home directory:
cat readme

2๏ธโƒฃ Level 1 โ†’ 2

The password for the next level is stored in a file called - located in the home directory.

cat readme

3๏ธโƒฃ Level 2 โ†’ 3

The password f is stored in a file called spaces in this filename located in the home directory.

cat spaces\ in\ this\ filename

4๏ธโƒฃ Level 3 โ†’ 4

The password is stored in a hidden file .
cat ...Hiding-From-You

5๏ธโƒฃ Level 4 โ†’ 5

The password is stored in the only human-readable file in the inhere directory. Tip: if your terminal is messed up, try the โ€œresetโ€ command.

find . -type f | xargs file

6๏ธโƒฃ Level 5 โ†’ 6

The password is stored in a file somewhere under the inhere directory and has all of the following properties:

  • human-readable

  • 1033 bytes in size

  • not executable

    find . -type f -size 1033c ! -executable

7๏ธโƒฃ Level 6 โ†’ 7

The password is stored somewhere on the server and has all of the following properties:

  • owned by user bandit7

  • owned by group bandit6

  • 33 bytes in size

    find / -type f -user bandit7 -group bandit6 -size 33c

8๏ธโƒฃ Level 7 โ†’ 8

Password stored in data.txt, next to the word โ€œmillionthโ€
Using String to find the password beside โ€œmillionthโ€.
strings data.txt | grep โ€œmillionthโ€

9๏ธโƒฃ Level 8 โ†’ 9

The password is stored in the file data.txt and is the only line of text that occurs only once
sort data.txt | uniq -c

๐Ÿ”Ÿ Level 9 โ†’ 10

Use the command strings to search password stored in the file data.txt in one of the few human-readable strings, preceded by several โ€˜=โ€™ characters.
strings data.txt | grep โ€œ=โ€

0
Subscribe to my newsletter

Read articles from V. Leela directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

V. Leela
V. Leela