Linux CLI — Shells Bells | Tryhackme | Day-1
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内,并且不需要特定的开头。首先,我得仔细阅读用户提供的文章内容。 文章主要讲述了作者参与TryHackMe的“Advent of Cyber 2025”活动的经历。通过每天的挑战,作者学习了Linux CLI的基础知识,包括命令的使用、文件系统的导航、日志分析以及安全防护等。过程中遇到了一些问题,比如寻找隐藏文件和分析恶意脚本,最终通过解决这些问题获得了几个flag。 接下来,我需要将这些信息浓缩到100字以内。要抓住关键点:活动名称、学习内容、涉及的操作和成果。确保语言简洁明了,不遗漏重要信息。 最后,检查字数是否符合要求,并确保表达流畅自然。 </think> 文章讲述了通过TryHackMe的“Advent of Cyber 2025”活动学习Linux命令行界面(CLI)的过程,包括导航文件系统、分析日志、查找隐藏文件和恶意脚本等内容,并通过解决实际问题获得了多个flag。 2026-2-15 18:6:28 Author: infosecwriteups.com(查看原文) 阅读量:0 收藏

Advent of Cyber 2025 | Walkthrough

M o $ t a

Hey my dear readers_ Today, we are solving the TryHackMe Advent of Cyber Prep Track 2025. Advent of Cyber wasn’t just about theory — it was about hands-on learning, every single day. Each challenge pushed me to think like an attacker while also understanding defensive perspectives.

What Advent of Cyber Taught Me

Through daily labs and challenges, I got practical exposure to:

  • Real-world attack scenarios
  • Common vulnerabilities and misconfigurations
  • Blue team vs Red team perspectives
  • How small security mistakes are exploited in practice

Instead of just reading concepts, I was actively solving problems, which made learning stick.

Press enter or click to view image in full size

Find the room here:

Welcome to Advent of Cyber 2025 DAY-01.

The unthinkable has happened — McSkidy has been kidnapped. Without her, Wareville’s defenses are faltering, and Christmas itself hangs by a thread. But panic won’t save the season. A long road lies ahead to uncover what truly happened. The TBFC (The Best Festival Company) team already brainstorms what to do next, and their first lead points to the tbfc-web01, a Linux server processing Christmas wishlists. Somewhere within its data may lie the truth: traces of McSkidy’s final actions, or perhaps the clues to King Malhare’s twisted vision for EASTMAS.

Press enter or click to view image in full size

Learning Objectives

  • Learn the basics of the Linux command-line interface (CLI)
  • Explore its use for personal objectives and IT administration
  • Apply your knowledge to unveil the Christmas mysteries

Answer the questions below

Answer: no-answer-needed

Press enter or click to view image in full size

Working With the Linux CLI

- But, there is no graphical interface (GUI) on the server! How will we look for clues?
- Who needs a GUI when we have a Linux command-line terminal? It’s even better!

Get M o $ t a’s stories in your inbox

Join Medium for free to get updates from this writer.

Linux has a powerful command-line interface, allowing you to use and manage the system simply by typing commands on your keyboard. It’s not as hard as it sounds — once you get used to it, maybe you’ll like the CLI more than the graphical interface. Not only that, but most experienced IT and cyber security experts work with the CLI every day, so let’s start learning!

  • To run your first CLI command, type echo “Hello World!” and press Enter. This will “echo” the text back.
  • Then type ls to list the contents of the current directory. This command will show you McSkidy’s files.
  • After that, type cat README.txt to display the file contents. You will see its content in the output below.

Navigating the Filesystem

Looks like McSkidy left a security guide before being kidnapped — it would definitely help! You might have noticed the “Guides” directory when you ran ls last time — that’s likely the directory we need. Your CLI journey began at McSkidy’s home directory (you can verify this by running pwd), but now let’s switch to the guides directory.

  • Switch the directory by running cd Guides. You will appear at /home/mcskidy/Guides.
  • Run the ls command again to list the content of the guides directory (it will be empty).

Looking for the Hidden Guide

Oh-oh, it looks like the guides aren’t there. Or are they? In Linux, files and directories can be hidden from plain view if they start with a dot symbol (e.g., .secret.txt). Such a feature is often used by IT administrators to hide system files, by attackers to hide malware, and now by McSkidy to hide the precious guide from bad bunnies!

  • View the directory again by running ls -la. The -a flag shows the hidden files. The -l flag shows the additional details, such as file permissions and file owner.
  • Read the hidden guide by running cat .guide.txt. Don’t forget the leading dot.

Grepping the Logs

In her guide, McSkidy refers to /var/log/, a Linux directory where all security events (logs) are stored. Indeed, every SOC analyst at TBFC will confirm that the best way to find evil bunnies is to check the logs. Log files are usually very big, and looking through them with cat is not ideal. Thus, let’s use grep, a command to look for a specific text inside a file.

  • Navigate to the logs directory with cd /var/log and explore its content with ls.
  • Run grep “Failed password” auth.log to look for the failed logins inside the auth.log.

Finding the Files

You can see a lot of failed logins on the “socmas” account, all from the HopSec location! They were clearly trying to break into SOC-mas, Wareville’s Christmas ordering platform. What if bad bunnies left some malware there? Let’s follow McSkidy’s guide and look for Eggsploits and Eggshells with find — a command that searches for files with specific parameters, such as -name:

  • Run find /home/socmas -name *egg* to search for “eggs” in the socmas home directory.
  • Note that find is a powerful command. Check out its documentation for more details.

Analyzing the Eggstrike

Looks like you found something, eggstrike.sh! Files with the .sh extension contain CLI commands and are called shell scripts. Such scripts are used both by IT teams to automate things and by attackers to quickly run malicious commands. Let’s display the suspicious script’s content and try to understand it:

  1. The lines starting with # are just comments and are not the actual commands.
  2. The cat wishlist.txt | sort | uniq lists unique items from the wishlist.txt.
  3. The command then sends the output (unique orders) to the /tmp/dump.txt file.
  4. The rm wishlist.txt deletes the wishlist file (containing Christmas wishes).
  5. The mv eastmas.txt wishlist.txt replaces the original file with eastmas.txt.

Press enter or click to view image in full size

Now it is clear that the server has been breached, and the Christmas wishlist has been replaced with an EASTMAS one. Although you found no clue of what happened to McSkidy, at least you know the attackers were there. You can see how Sir Carrotbane replaced the wishlist by visiting http://MACHINE_IP:8080 from the VM’s web browser. You can open it by clicking the Firefox icon on the Desktop.

System Utilities

There are hundreds of CLI commands to view and manage your system. For example, uptime to see how much time your system is running, ip addr to check your IP address, and ps aux to list all processes. You may also check the usernames and hashed passwords of users, such as McSkidy, by running cat /etc/shadow. However, you’d need root permissions to do that.

Root User

Root is the default, ultimate Linux user who can do anything on the system. You can switch the user to root with sudo su, and return back to McSkidy with the exit command. Only root can open /etc/shadow and edit system settings, so this user is often a main target for attackers. If at any moment you want to verify your current user, just run whoami!

  • Switch to the root user by running the sudo su command.
  • You can verify your current user by running whoami.

Bash History

Did you know that every command you run is saved in a hidden history file, also called Bash history? It is located at every user’s home directory: /home/mcskidy/.bash_history for McSkidy, and /root/.bash_history for root, and you can check it with a convenient history command, or just read the files directly with cat. Let's check if Sir Carrotbane with his bad bunnies left their traces in history!

  • Familiarize yourself with Bash history by running the history command.
  • Note that your commands are also saved to a file (cat .bash_history).

Press enter or click to view image in full size

Answer the questions below…

Which CLI command would you use to list a directory?

Answer: ls

Press enter or click to view image in full size

What flag did you see inside of the McSkidy’s guide?

Answer: THM{learning-linux-cli}

Which command helped you filter the logs for failed logins?

Answer: grep

Press enter or click to view image in full size

What flag did you see inside the Eggstrike script?

Answer: THM{sir-carrotbane-attacks}

Which command would you run to switch to the root user?

Answer: sudo su

Press enter or click to view image in full size

Finally, what flag did Sir Carrotbane leave in the root bash history?

Answer: THM{until-we-meet-again}

Answer the questions below

Answer: no-answer-needed

Answer the questions below

Answer: no-answer-needed

Press enter or click to view image in full size

Follow me and Let’s go to next lavel……

文章来源: https://infosecwriteups.com/linux-cli-shells-bells-tryhackme-day-1-f3f30ad7adb8?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh