Pre-Security Path
Quote
To outsmart a hacker, you need to think like one.
Offensive Security is the process of breaking into computer systems, exploiting bugs, and finding loopholes in applications to gain unauthorised access.
Offensive Security is the process of breaking into computer systems, exploiting bugs, and finding loopholes in applications to gain unauthorised access.
Q: Which of the following options better represents the process where you simulate a hacker's actions to find vulnerabilities in a system?
A: Offensive Security
TryHackMe Machine Started
Quote
We will use a command-line application called "GoBusterforce FakeBank's website to find hidden directories and pages. Gobuster will take a list of potential page or directory names and try accessing a website with each of them; if the page exists, it tells you.
To begin the first hack the tutorial prompts the user into using the command.
To attempt to find relevant website pages through brute force.
GoBuster Command Output
GoBuster Command Output
Q: Above your account balance, you should now see a message indicating the answer to this question. Can you find the answer you need?
A: BANK-HACKED
A short description of a few offensive security roles:
- Penetration Tester - Responsible for testing technology products for finding exploitable security vulnerabilities.
- Red Teamer - Plays the role of an adversary attacking an organisation and providing feedback from an enemy's perspective.
- Security Engineer - Design, monitor and maintain security controls, network systems to help prevent cyberattacks.
Defensive Security Introduction