TryHackMe: Complete Beginner
- author:: Nathan Acks
- date:: 2021-10-13
Encryption
Key Terms
This room draws the distinction between a password (which is used as part of an authentication process) and a passphrase (which is used to encrypt key material).
Crucial Crypto Maths
Interesting side note: Spotlight (at least on iOS/iPadOS) understands %
as the modulo operator.
RSA (Rivest Shamir Adleman)
Explaining Diffie Hellman Key Exchange
Simpler Diffie-Hellman key exchange:
- Assume two secrets, A and B.
- Exchange some public material C.
- Exchange A ⊗ C and B ⊗ C
- Construct A ⊗ B ⊗ C and use that as your symmetric encryption key.
The magic here is in the operator ⊗ - it must be both commutative and very very hard to reverse even with knowledge of C. So “normal” multiplication doesn’t work here (since if ⊗ were multiplication, then it would be easy to extract A from A ⊗ C by observing C).
Introduction to Windows
Windows File System and Permissions Explained
C:/PerfLogs = performance and troubleshooting logs.
The biggest differences between Windows and UNIX permissions:
- Windows doesn’t have as fine-grained of control for a given user or group.
- Windows has much more fine-grained control across users and groups (there’s no limit of three permission sets).
- The ability to delete a folder or file, and to change its permissions, are essentially considered to be distinct “sub-permissions”.
The icacls
tool can be used to check (and change!) permissions at the command line, but its output is somewhat different than that of the “Security” tab in the file or folder properties.
(I)
- permission inherited from the parent container(F)
- full access (full control)(M)
- modify right/access(OI)
- object inherit(IO)
- inherit only(CI)
- container inherit(RX)
- read and execute(AD)
- append data (add subdirectories)(WD)
- write data and add files