TryHackMe: Event Horizon Write-up
Introduction Challenge Link: Event Horizon Join Tom and Dom on a quest to find out what happens when you look beyond the Event Horizon. A quest beyond borders, they need you to utilize all your a...
Introduction Challenge Link: Event Horizon Join Tom and Dom on a quest to find out what happens when you look beyond the Event Horizon. A quest beyond borders, they need you to utilize all your a...
Introduction Challenge Link: Warzone 2 An alert triggered: Misc activity, A Network Trojan Was Detected, and Potential Corporate Privacy Violation. Inspect the PCAP and retrieve the artifacts to ...
Introduction Challenge Link: Warzone1 An alert triggered: Potentially Bad Traffic and Malware Command and Control Activity detected. Inspect the PCAP and retrieve the artifacts to confirm this al...
Introduction Challenge Link: Atomic Bird Goes Purple #2 This room is a direct sequel to its first part (Atomic Bird Goes Purple #1). Check my write-up for the first part. I mentioned the tools a...
Introduction Challenge Link: Atomic Bird Goes Purple #1 This room enhances Purple Team exercises by moving beyond basic/default approaches through real-life threat emulation and detection engine...
Scenario Challenge Link: Hunt Me II: Typo Squatters Just working on a typical day as a software engineer, Perry received an encrypted 7z archive from his boss containing a snippet of a source cod...
Interoduction Room Link: windowsprivesc20 Privilege escalation (PrivEsc) means exploiting weaknesses to move from a lower-privileged account to a higher-privileged one, often targeting administrat...
Introduction Room Link: Linux Privilege Escalation Note: This writeup includes external research and personal explanations. Linux privilege escalation refers to the unauthorized act of gaining ...
Introduction: Challenge Link: Forensics The challenge is to analyze the memory dump of a compromised system. Volatility Overview: Volatility 3 is an open-source memory forensics framework used t...
Objective Challenge Link: Pyrat There is an open HTTP server that has a python code execution vulnerability. Exploit this vulnerability to gain a shell to target machine, search for a credentials...