THM Series #6 Ignite

Another room from TryHackMe focusing on exploiting an RCE and Default configuration. The room is rated as Easy on the platform. The room can be accessed here. As per the room description, we have a newly deployed Web Server and there seems to be issues with the web server configuration. We are supposed to find... Continue Reading →

THM Series #5 Kenobi

To maintain the streak of continuous presence on TryHackMe, I tried my hands on another easy level machine. I am trying to cover easy machines and have the write up updated before scaling to medium difficulty. I selected Kenobi which is described as this room will cover accessing a Samba share, manipulating a vulnerable version... Continue Reading →

THM Series #4 Brooklyn Nine Nine

Back after a break with a room dedicated to one of my favorite shows Brooklyn Nine Nine. As per TryHackMe, the room is categorized as easy. The room can be accessed here. I too find it apt for the beginner category and very easy if we follow the guideline to test the basics before going... Continue Reading →

THM Series #3 Bounty Hacker

Another easy box from Try Hack Me. The CTF can be accessed here. Let's start the journey. The first step of the approach is to enumerate the open services on the asset. The nmap detected 3 ports to be open on the asset. Port 21, 22 and 80. Nmap Output I tried logging into the... Continue Reading →

THM Series #2 Avengers Blog

Another attempt to share walkthrough and this time it is Avengers Blog from Try Hack Me platform. THM describes this activity as "A beginner guide to SQL and Command Injection". Deploy the target machine Deploy Q1. On the deployed Avengers machine you recently deployed, get the flag1 cookie value. NMAP Result I performed a nmap... Continue Reading →

Up ↑