THM Network Security - grunt92/IT-Sec-WriteUps GitHub Wiki
Introduction
What type of firewall is Windows Defender Firewall?
Host Firewall
Methodology
During which step of the Cyber Kill Chain does the attacker gather information about the target?
Recon
Practical Example of Network Security
Follow the instructions and you will get all answers required to complete the task.
What is the password in the secret.txt file?
ABC789xyz123
What is the content of the flag.txt in the /root directory?
THM{FTP_SERVER_OWNED}
What is the content of the flag.txt in the /home/librarian directory?
THM{LIBRARIAN_ACCOUNT_COMPROMISED}