Sabitlenmiş Tweet

Day 9 — 14Day Cybersecurity Challenge
Today I learned about basic backdoor concepts and connection handling using Metasploit, and I conducted a real-life test on my personal Windows lab systems (Windows 10 & Windows 11).
This wasn’t just theory. I was able to successfully gain access to my own Windows machines using a basic backdoor payload in a fully authorized environment, which helped me understand how real world compromises happen and how they should be prevented.
What I learned:
• How basic backdoors work and how they establish connections
• How listeners handle incoming sessions
• How access is gained when endpoint protections are weak or misconfigured
• Why endpoint security, AV/EDR, and system hardening are critical
Tools used:
• Metasploit Framework
• Msfvenom
• Windows 10 & Windows 11 (personal systems only)
Real world takeaway:
There are many types of backdoors, but understanding even a basic one makes it clear how attackers gain access in real environments and more importantly, how defenders can detect, block, and respond to them.
This hands-on test reinforced the importance of:
• Endpoint monitoring
• Application control
• Least privilege
• Proper security configurations
All testing was done on systems I own and have explicit permission to test.
This learning is focused on defensive security through real understanding, not misuse.
Day 9 complete ✅
Learning by doing. Defending by understanding. 🚀
@thatboringbro
@adeolatemi_
@Ifepresh001
@AyomideAdams13
@Short_Whiteside
@RedHunterFavour
#7DayCyberChallenge #CyberSecurity #Infosec #BlueTeam #Metasploit #EthicalHacking #LearningInPublic

English




















