Skip to the content.

đź”— Link to the Room

🏷️ Table of Contents

  1. Introduction
  2. Methodology
  3. Practical Example of Network Security

📚 Study Notes

Learning Objectives

Introduction

Why network security matters

 

[!IMPORTANT] Strong network security is essential to reduce financial loss and protect sensitive data.

 


❓What type of firewall is Windows Defender Firewall?Host Firewall

Solution: It runs on your computer and protects only that device, not the whole network. —

 

Methodology

1. Reconnaissance – Gather information about the target (systems, users, IPs).
2. Weaponization – Prepare malware or a malicious file.
3. Delivery – Send the malicious file to the target (email, USB, etc.).
4. Exploitation – Victim opens the file, triggering the attack.
5. Installation – Malware installs on the system.
6. Command & Control (C2) – Attacker gains remote control of the system.
7. Actions on Objectives – Attacker achieves goals (e.g., data exfiltration).

image


❓During which step of the Cyber Kill Chain does the attacker gather information about the targetRecon

✅Solution: The attacker gathers info about the target before launching the attack, which is first step —

Practical Example of Network Security

  1. Start AttackBox and target machine and open the terminal.
  2. Run Recon with Nmap: Scan the target → find open services (FTP, SSH, HTTP).
    • command: nmap MACHINE_IP
  3. Connect to FTP: Log in as anonymous and list files.
    • command: ftp MACHINE_IP; anonymous; then ls to list files.
  4. Download interesting files (like secret.txt).
    • command: get FILE_NAME then exit
  5. Read the file with cat to find a password.
    • command: cat FILE_NAME
  6. Login with SSH as root using the discovered password.
    • command: ssh root@MACHINE_IP
  7. You now have full access to the system.
  8. Navigate folders (cd, ls, pwd) and read flag files with cat.

 


❓What is the password in the secret.txt file?ABC789xyz123

✅Solution: First 5 steps in the list above. —

❓What is the content of the flag.txt in the /root directory?THM{***_******_*****}

✅Solution: Use commands (without brackets): [cd /root], [ls], [cat flag.txt] —

❓What is the content of the flag.txt in the /home/librarian directory?THM{*********_*******_***********}

✅Solution: Use commands (without brackets): [cd /home/librarian], [ls], [cat flag.txt] —