TryHackMe: Complete Beginner

author: Nathan Acks
date: 2021-10-13

Encryption

Key Terms

This room draws the distinction between a password (which is used as part of an authentication process) and a passphrase (which is used to encrypt key material).

Crucial Crypto Maths

Interesting side note: Spotlight (at least on iOS/iPadOS) understands % as the modulo operator.

RSA (Rivest Shamir Adleman)

Explaining Diffie Hellman Key Exchange

Simpler Diffie-Hellman key exchange:

The magic here is in the operator ⊗ - it must be both commutative and very very hard to reverse even with knowledge of C. So “normal” multiplication doesn’t work here (since if ⊗ were multiplication, then it would be easy to extract A from A ⊗ C by observing C).

Introduction to Windows

Windows File System and Permissions Explained

C:/PerfLogs = performance and troubleshooting logs.

The biggest differences between Windows and UNIX permissions:

The icacls tool can be used to check (and change!) permissions at the command line, but its output is somewhat different than that of the “Security” tab in the file or folder properties.