đź”— Link to the Room
🏷️ Table of Contents
📚 Study Notes
Learning Objectives
- learn what is network security and its purpose
- what is CIA triad
- difference between HW and SW based security solution
- what is firewall, IDS, IPS, VPN concentrator
- and many more things …
Introduction
- A computer network is a group of connected computers and devices.
-
Network security focuses on protecting these devices, the connections between them, and the data they carry by ensuring confidentiality, integrity, and availability (CIA).
- Network security is achieved using hardware and software solutions:
-
Hardware security solutions (these are physical devices used to protect networks): firewall appliance (controls incoming and outgoing traffic using predefined rules), IDS (Intrusion Detection System, detects attacks or intrusion attempts), IPS (Intrusion Prevention System, detects and actively blocks attacks), VPN concentrator (encrypts network traffic to protect data confidentiality and integrity).
-
Software security solutions (these are programs installed on systems): Antivirus software (detects and blocks malicious files), host firewall (software-based firewalls built into operating systems, e.g. Windows Defender Firewall, macOS firewall).
-
Why network security matters
-
Data breaches are extremely costly. According to IBM Security:
- Average breach cost (2021): $4.24 million
- Healthcare sector: ~$9.23 million
- Education sector: ~$3.79 million
Â
[!IMPORTANT] Strong network security is essential to reduce financial loss and protect sensitive data.
Â
❓What type of firewall is Windows Defender Firewall?
Host FirewallSolution: It runs on your computer and protects only that device, not the whole network. —
Â
Methodology
-
Successful attacks require planning and information gathering, similar to planning wildlife photography, a military operation, or a burglary.
-
Breaking into a network usually follows the Cyber Kill Chain, which has seven steps:
1. Reconnaissance – Gather information about the target (systems, users, IPs).
2. Weaponization – Prepare malware or a malicious file.
3. Delivery – Send the malicious file to the target (email, USB, etc.).
4. Exploitation – Victim opens the file, triggering the attack.
5. Installation – Malware installs on the system.
6. Command & Control (C2) – Attacker gains remote control of the system.
7. Actions on Objectives – Attacker achieves goals (e.g., data exfiltration).
- The process is similar to a thief planning a break-in: observe first, plan entry, then steal valuables.
❓During which step of the Cyber Kill Chain does the attacker gather information about the target
Recon✅Solution: The attacker gathers info about the target before launching the attack, which is first step —
Practical Example of Network Security
- Start AttackBox and target machine and open the terminal.
- Run Recon with Nmap: Scan the target → find open services (FTP, SSH, HTTP).
- command:
nmap MACHINE_IP
- command:
- Connect to FTP: Log in as anonymous and list files.
- command:
ftp MACHINE_IP;anonymous; thenlsto list files.
- command:
- Download interesting files (like secret.txt).
- command:
get FILE_NAMEthenexit
- command:
- Read the file with
catto find a password.- command:
cat FILE_NAME
- command:
- Login with SSH as root using the discovered password.
- command:
ssh root@MACHINE_IP
- command:
- You now have full access to the system.
- Navigate folders (
cd,ls,pwd) and read flag files withcat.
Â
❓What is the password in the secret.txt file?
ABC789xyz123✅Solution: First 5 steps in the list above. —
❓What is the content of the flag.txt in the /root directory?
THM{***_******_*****}✅Solution: Use commands (without brackets): [cd /root], [ls], [cat flag.txt] —
❓What is the content of the flag.txt in the /home/librarian directory?
THM{*********_*******_***********}✅Solution: Use commands (without brackets): [cd /home/librarian], [ls], [cat flag.txt] —