Posts

TryHackMe : Physical Security Intro

Image
          TryHackMe : Physical Security Intro     This room is an introduction to physical security methods to bypass locks,  doors and other physical barriers:       Task 1 : Introduction:              Read the content and mark as completed          Task 2 : Overt, Covert, and Surreptitious Entry:            Q : Using an angle grinder to cut a lock open is what type of entry? ans :  1     Q : Lock picking could be considered what type of entry?                ans :  2 Q : Lock bypassing can be considered what type of entry?                ans :   2 Q : Taking a photo of a key, decoding it and duplicating it can be conside...

METASPLOIT Framework BASICS

Image
 METASPLOIT BASICS T erminology :         Throughout this , we’ll use various terms that first bear some explanation.The majority of the following basic terms are defined in the context ofMetasploit, but they are generallythe same throughout the security industry.     Exploit :         An exploit is the means by which an attacker, or pentester for that matter, takes advantage of a flaw within a system, an application, or a service. An attacker uses an exploit to attack a system in a way that results in a particular desired outcome that the developer never intended. Common exploits include buffer overflows, web application vulnerabilities (such as SQL injection), and con-figuration errors. Payload :       A payload is code that we want the system to execute and that is to be selected and delivered by the Framework. For example, a reverse shell is a payload that creates a connection from...