Introduction to Offensive Security: Network Security (TryHackMe)

J3bitokJ3bitok
1 min read

In this article, I will write a write-up for Network Security that covers Methodology and Practical Examples of Network Security.

  1. What type of firewall is Windows Defender Firewall? Host Firewall

  2. During which step of the Cyber Kill Chain does the attacker gather information about the target? Recon

Let’s summarize what we have done in this task to get root access on the target system of IP address MACHINE_IP:

  1. We used nmap to learn about the running services.

  2. We connected to the FTP server to learn more about its configuration.

  3. We discovered a file containing the root password mistakenly copied to a public folder.

  4. We used the password we found, allowing us to log in successfully.

  5. We gained access to all the users’ files.

  1. What is the password in the secret.txt file? ABC789xyz123

  1. What is the content of the flag.txt in the /root directory? THM{FTP_SERVER_OWNED}

  2. What is the content of the flag.txt in the /home/librarian directory? THM{LIBRARIAN_ACCOUNT_COMPROMISED}

Thank you for reading my article. Please leave any questions or comments on improving my learning journey and the Lab THM challenges. We can also connect more on LinkedIn or X.

0
Subscribe to my newsletter

Read articles from J3bitok directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

J3bitok
J3bitok

Software Developer Learning Cloud and Cybersecurity Open for roles * If you're in the early stages of your career in software development (student or still looking for an entry-level role) and in need of mentorship you can book a session with me on Mentorlst.com.