Skip to content

Pre-Security Path


What is Offensive Security

Quote

To outsmart a hacker, you need to think like one.

Offensive Security is the process of breaking into computer systems, exploiting bugs, and finding loopholes in applications to gain unauthorised access.

Offensive Security is the process of breaking into computer systems, exploiting bugs, and finding loopholes in applications to gain unauthorised access.

Questions

Q: Which of the following options better represents the process where you simulate a hacker's actions to find vulnerabilities in a system?
A: Offensive Security


Hacking Your First Machine

Starting Machine

screenshot of bank tryhackme.png
TryHackMe Machine Started

First Hack

open terminal tryhackme.png

Quote

We will use a command-line application called "GoBusterforce FakeBank's website to find hidden directories and pages. Gobuster will take a list of potential page or directory names and try accessing a website with each of them; if the page exists, it tells you.

Gobuster

To begin the first hack the tutorial prompts the user into using the command.

gobuster -u http://fakebank.thm -w wordlist.txt dir

To attempt to find relevant website pages through brute force.

gobuster_fakebank_tryhackme.png
GoBuster Command Output

No Questions for this section

gobuster_fakebank_tryhackme.png
GoBuster Command Output

Hack The Bank

tryhackme_admin_panel.png
bank done tryhackme.png

Questions

Q: Above your account balance, you should now see a message indicating the answer to this question. Can you find the answer you need?
A: BANK-HACKED


Cyber Security Careers

A short description of a few offensive security roles:
- Penetration Tester - Responsible for testing technology products for finding exploitable security vulnerabilities.
- Red Teamer - Plays the role of an adversary attacking an organisation and providing feedback from an enemy's perspective.
- Security Engineer - Design, monitor and maintain security controls, network systems to help prevent cyberattacks.

No Questions for this section


Defensive Security Introduction