Trying to learn hacking using tryhackme Offensive Security Intro
The first room of tryhackme
Offensive Security Intro
This room is given to us as a walkthrough the note consists of only the knowledge from the room
What is Offensive Security?
There are two things types of general tasks in cyber security.
- Offensive security involves breaking into systems, exploiting software bugs and finding loopholes to gain unauthorized access.
- Defensive security is the opposite of offensive and involves knowing and preventing those exploits.
Hacking your first machine
This part of the room gives a website and a terminal access which can be used to do an attack on a website. we use the tool
gobuster
which is a terminal based tool that is used to brute force directories on web server. According to the kali website,1
Gobuster is a tool used to brute-force: URIs (directories and files) in web sites, DNS subdomains (with wildcard support), Virtual Host names on target web servers, Open Amazon S3 buckets, Open Google Cloud buckets and TFTP servers.
we used the tool in the virtual macihne and given the directed command
1
gobuster -u http://fakebank.thm -w wordlist.txt dir
This command breaks down to multiple parts
gobuster
is the tool name-u
is the flag that tells the next input is an url and thehttp://fakebank.thm
is the input url-w
flag stands for wordlist and thewordlist.txt
is the provided file that contains a list of common directories.dir
is the mode of scan in the gobuster. This tells gobuster to run directory brute force attack.
and this gives an output /bank transfer directory gives http code 200 (accepted) so when we go there we find that this is an admin panel where we can control and transfer money.
Careers in cyber security
There are a lot of tools available similar to the one used with previous task and we desparately need a lot of cyber security professionals. Some of the roles learning offensive cyber security gives are
- Penetration Tester - Responsible for testing technology products for finding exploitable security vulnerabilities.
- Red Teamer - Plays the role of an adversary, attacking an organization and providing feedback from an enemy’s perspective.
- Security Engineer - Design, monitor, and maintain security controls, networks, and systems to help prevent cyberattacks.