TryHackMe: Blaster Write-up
Objective Challenge Link: Blaster The room objective is to look for alternative modes of exploitation without the use of Metasploit or any exploitation tools in general beyond nmap and dirbuster. ...
Objective Challenge Link: Blaster The room objective is to look for alternative modes of exploitation without the use of Metasploit or any exploitation tools in general beyond nmap and dirbuster. ...
Objective Challenge Link: Cheese CTF Hack into the machine and get the flags. Enumeration Start by enumerating the target machine There are a lot of open ports, and that could be the use of P...
Objective Challenge Link: Ice Deploy & hack into a Windows machine, exploiting a very poorly secured media server. Recon sudo nmap -sS -sV -n -F 10.10.37.29 Nmap...
Objective: Challenge Link: Mayhem Find the flag inside a PCAP file View the Conversations There are 6 TCP streams; we will view all of them and search for interesting findings. Stream 0 &...
Objective: Challenge Link: tJurassic Park Enumerate the web application, obtain credentials to the server, and find four flags hidden in the file system. Enumeration: Port Scanning sudo nmap -s...
Objective: Challenge Link: Jack Compromise a web server running Wordpress, obtain a low privileged user and escalate your privileges to root using a Python module. Enumeration: Start enumerating...
The Chaos Inside Challenge Link: Boogeyman 3 Lurking in the Dark Without tripping any security defences of Quick Logistics LLC, the Boogeyman was able to compromise one of the employees and stay...
Introduction Challenge Link: Boogeyman 2 After having a severe attack from the Boogeyman, Quick Logistics LLC improved its security defences. However, the Boogeyman returns with new and improved t...
Introduction Challenge Link: Boogeyman 1 Uncover the secrets of the new emerging threat, the Boogeyman.You are tasked to analyse the Tactics, Techniques, and Procedures (TTPs) executed by a threa...
Preparation - Tools and Artifacts Challenge Link: Tempest We will prepare the artifacts and introduce the tools needed for the investigation. hash the artifacts Toolset: The toolset ne...