THM Network Security - grunt92/IT-Sec-WriteUps GitHub Wiki

Introduction

What type of firewall is Windows Defender Firewall?

Host Firewall

Methodology

During which step of the Cyber Kill Chain does the attacker gather information about the target?

Recon

Practical Example of Network Security

Follow the instructions and you will get all answers required to complete the task.

What is the password in the secret.txt file?

ABC789xyz123

What is the content of the flag.txt in the /root directory?

THM{FTP_SERVER_OWNED}

What is the content of the flag.txt in the /home/librarian directory?

THM{LIBRARIAN_ACCOUNT_COMPROMISED}