Question: I need a cyber security to do the commands for this question and explain step by step on how to do it This question relates
I need a cyber security to do the commands for this question and explain step by step on how to do it
This question relates to auditingtriage commands that are ran on the MS VM
If not done so log into your MS using SSH from your Kali VM
Run the w command once you log into your MS VM
Given:
There should at least be two USERS, one of which should be root.
A root user should have a TTY that is labeled pts from :
The same root user should have an interactive login shell as WHAT bash
Question:
Can you explain the relationship between the session that is labeled pts from : and the process which uses "geometry" options as seen when you run ps efHww"
You may need to add the following argument if you are getting errors when attempting to log into your MS VM via ssh
o HostKeyAlgorithmssshdss
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
