Day 2 of 30 Days Hacking Streak: Windows Fundamentals Unveiled - All Windows Fundamental TryHackMe Rooms Solved
Day 2 Highlights: Windows Fundamentals Unveiled 🖥️🔒
I've delved deep into the foundational aspects of Windows operating systems, expanding my understanding of key concepts. Here's a glimpse of what I've learned:
Windows Fundamentals 1 TryHackMe Room:
🔹 Windows Editions: Windows offers a variety of editions tailored to different needs, from Home to Enterprise.
Questions Task 2 -WIndows Editions:
What encryption can you enable on Pro that you can't enable in Home?
Answer: BitLocker
🔹 The Desktop (GUI): The Graphical User Interface, or GUI, is the visual interface that allows users to interact with Windows.
Questions Task 3 -The Desktop (GUI):
Which selection will hide/disable the Search box?
Answer: Hidden
Which selection will hide/disable the Task View button?
Answer: Show Task View button
Besides Clock and Network, what other icon is visible in the Notification Area?
Answer: Action Center
🔹 The File System: Understanding how Windows organizes and manages files and folders for efficient data access.
Questions Task 4 -The File System:
What is the meaning of NTFS?
Answer: New Technology File System
🔹 The Windows\System32 Folders: Exploring critical system directories where essential Windows files reside.
Questions Task 5 -Windows\System32 Folders:
What is the system variable for the Windows folder?
Answer: %windir%
🔹 User Accounts, Profiles, and Permissions: Grasping the fundamentals of user management and access control.
Questions Task 6 - User Accounts, Profiles, and Permissions:
What is the name of the other user account?
Answer: tryhackmebilly
What groups is this user a member of?
Answer: Remote Desktop Users,Users
What built-in account is for guest access to the computer?
Answer: Guest
What is the account status?
Answer: Account is disabled
🔹 User Account Control: A vital security feature that safeguards against unauthorized system changes.
Questions Task 7 - User Account Control:
What does UAC mean?
Answer: User Account Control
🔹 Settings and the Control Panel: Tools for configuring and customizing Windows settings to suit your needs.
Questions Task 8 - Settings and the Control Panel:
In the Control Panel, change the view to Small icons. What is the last setting in the Control Panel view?
Answer: Windows Defender Firewall
🔹 Task Manager: A powerful utility for monitoring and managing running processes and system performance.
Questions Task 9 - Task Manager:
What is the keyboard shortcut to open Task Manager?
Answer: Ctrl+Shift+Esc
Windows Fundam
entals 2 TryHackMe Room: ⚙️🔧
🔹 System Configuration: Optimizing Windows settings for better performance and functionality.
Questions Task 2 - System Configuration:
What is the name of the service that lists Systems Internals as the manufacturer?
Answer: PsShutdown
Whom is the Windows license registered to?
Answer: Windows User
What is the command for Windows Troubleshooting?
Answer: C:\Windows\System32\control.exe /name Microsoft.Troubleshooting
What command will open the Control Panel? (The answer is the name of .exe, not the full path)
Answer: control.exe
🔹 Change UAC Settings: Taking control of User Account Control settings to balance security and convenience.
Question Task 3 - Change UAC Settings:
What is the command to open User Account Control Settings? (The answer is the name of the .exe file, not the full path)
Answer: UserAccountControlSettings.exe
🔹 Computer Management: Managing system resources efficiently, from disk management to device settings.
Questions Task 4- Computer Management:
What is the command to open Computer Management? (The answer is the name of the .msc file, not the full path)
Answer: compmgmt.msc
At what time every day is the GoogleUpdateTaskMachineUA task configured to run?
Answer: 6:15 AM
What is the name of the hidden folder that is shared?
Answer: sh4r3dF0Ld3r
🔹 System Information: Gaining insights into your computer's hardware and software components.
Questions Task 5- System Information:
What is the command to open System Information? (The answer is the name of the .exe file, not the full path)
Answer: msinfo32.exe
What is listed under System Name?
Answer: THM-WINFUN2
Under Environment Variables, what is the value for ComSpec?
Answer: %SystemRoot%\system32\cmd.exe
🔹 Resource Monitor: Real-time monitoring of system performance, including CPU, memory, disk, and network usage.
Questions Task 6- Resource Monitor:
What is the command to open Resource Monitor? (The answer is the name of the .exe file, not the full path)
Answer: resmon.exe
🔹 Command Prompt: Tapping into the power of the command line for advanced control and automation.
Questions Task 7- Command Prompt:
In System Configuration, what is the full command for Internet Protocol Configuration?
Answer: C:\Windows\System32\cmd.exe /k %windir%\system32\ipconfig.exe
For the ipconfig command, how do you show detailed information?
Answer: ipconfig /all
🔹 Registry Editor: Accessing and editing the Windows Registry for fine-grained configuration.
Questions Task 8- Registry Editor:
What is the command to open the Registry Editor? (The answer is the name of the .exe file, not the full path)
Answer: regedt32.exe
Windows Fundamentals 3 TryHackMe Room: 🛡️🔄
🔹 Windows Updates: Keeping your system secure and up-to-date with the latest patches and improvements.
Question Task 2- Windows Updates: There were two definition updates installed in the attached VM. On what date were these updates installed?
Answer: 5/3/2021
🔹 Windows Security: Comprehensive protection against digital threats, including malware and phishing attacks.
Question Task 3- Windows Security: In the above image, which area needs immediate attention?
Answer: Virus & threat protection
🔹 Virus & Threat Protection: Configuring tools and settings to safeguard your system from malicious software.
Question Task 4-Virus & Threat Protection: Specifically, what is turned off that Windows is notifying you to turn on?
Answer: Real-time protection
🔹 Firewall & Network Protection: Managing network security settings to control data traffic in and out of your PC.
Question Task 5-Firewall & Network Protection: If you were connected to airport Wi-Fi, what most likely will be the active firewall profile?
Answer: Public network
🔹 App & Browser Control: Enhancing application and web browsing security with tailored settings.
🔹 Device Security: Ensuring physical device security to prevent unauthorized access.
Question Task 7 - Device Security: What is the TPM?
Answer: Trusted Platform Module
🔹 BitLocker: Encrypting your data to protect it from prying eyes, especially on portable devices.
Question Task 8 - BitLocker: What must a user insert on computers that DO NOT have a TPM version 1.2 or later?
Answer: USB startup key
🔹 Volume Shadow Copy Service: A valuable feature for creating and restoring previous versions of files and folders.
Question Task 9 - Volume Shadow Copy Service: What is VSS?
Answer: Volume Shadow Copy Service
Why is this Knowledge Essential? 🤔💡
In an increasingly digital world, understanding these Windows fundamentals is paramount. Whether you're a cybersecurity enthusiast, an IT professional, or an everyday user, these insights empower you to:
🌐 Navigate Windows environments with confidence.
🔒 Strengthen your system's security.
🚀 Optimize your computer's performance.
🔨 Unlock advanced troubleshooting and customization capabilities.
Join Me on this Learning Journey via LinkedIn! 🤝📖
I'm dedicated to maintaining this 30-day Hacking Streak and sharing daily insights with you. While I'm starting with TryHackMe, I'm eager to explore more, expand my horizons, and tackle advanced challenges. I invite you all to connect, engage, and learn together as we embark on this exciting adventure! 💬🌟
Let's grow, evolve, and conquer new heights in the realm of cybersecurity. Feel free to reach out if you have questions or want to join the journey! 🚀👨💻
#30DaysHackingStreak #Cybersecurity #WindowsFundamentals #LearningJourney
Comments
Post a Comment
1) Read and understand the article before commenting: It's important to read the entire article and try to understand the message being conveyed before leaving a comment. This can help you avoid making false claims or misinterpreting the author's intent.
2) Be respectful: When leaving a comment, be respectful of others, including the author, other commenters, and any individuals mentioned in the article. Avoid using derogatory or offensive language, and do not insult or attack others.
3) Stay on topic: When leaving a comment, make sure it's relevant to the article or topic being discussed. Avoid going off on tangents or bringing up unrelated issues.
4) Back up your claims: If you are making a claim or statement in your comment, make sure you have evidence to support it. This can help prevent false information from spreading.
5) Avoid hate speech: Hate speech is any speech that attacks a person or group on the basis of their race, religion, gender, sexual orientation, or other characteristics. Avoid using hate speech in your comments, as it can be hurtful and offensive to others.
6) Check your emotions: If you feel strongly about a topic, it's important to check your emotions before leaving a comment. Avoid making comments when you're angry or upset, as this can lead to making false claims or using offensive language.
7) Don't feed the trolls: If you encounter a comment that is false or offensive, avoid engaging with the commenter. Responding to trolls or individuals who are looking to stir up controversy can often make the situation worse.