With DC-1 out of the way, let’s move onto DC-2 of the DC Series!
DC-2 Details Click here to see DC-2's quick overview. Much like DC-1, DC-2 is another purposely built vulnerable lab for the purpose of gaining experience in the world of penetration testing.
Let’s root DC-1!
Details can be found at https://www.five86.com/dc-1.html
Open this to see the box's overview pulled from the above website. DC-1 is a purposely built vulnerable lab for the purpose of gaining experience in the world of penetration testing. It was designed to be a challenge for beginners, but just how easy it is will depend on your skills and knowledge, and your ability to learn.
Basics of Networking A network is two or more hosts connected together in order to exchange data. There’s two network types: WAN (Wide Area Network) - network that connects large geographical areas. LAN (Local Area Network) - network that is confined within a WAN network.
OSI Layers & PDU OSI Model is a 7 abstract layer table that’s responsible for explaining the flow of data within a network. Experienced individuals will often call out an issue by the culprit layer number. example: “This is a level 3 issue.
/ Root - Where it begins Linux uses a tree oriented hierarchy, meaning it starts at one point and branches outward. This starting point is the / (system root) directory.
This particular hierarchy layout is based on the FHS (Filesystem Hierarchy Standard).