TryHackMe: Warzone 1 Write-up
Introduction Challenge Link: Warzone1 An alert triggered: Potentially Bad Traffic and Malware Command and Control Activity detected. Inspect the PCAP and retrieve the artifacts to confirm this al...
Introduction Challenge Link: Warzone1 An alert triggered: Potentially Bad Traffic and Malware Command and Control Activity detected. Inspect the PCAP and retrieve the artifacts to confirm this al...
Introduction Challenge Link: Atomic Bird Goes Purple #2 This room is a direct sequel to its first part (Atomic Bird Goes Purple #1). Check my write-up for the first part. I mentioned the tools a...
Introduction Challenge Link: Atomic Bird Goes Purple #1 This room enhances Purple Team exercises by moving beyond basic/default approaches through real-life threat emulation and detection engine...
Scenario Challenge Link: Hunt Me II: Typo Squatters Just working on a typical day as a software engineer, Perry received an encrypted 7z archive from his boss containing a snippet of a source cod...
Interoduction Room Link: windowsprivesc20 Privilege escalation (PrivEsc) means exploiting weaknesses to move from a lower-privileged account to a higher-privileged one, often targeting administrat...
Introduction Room Link: Linux Privilege Escalation Note: This writeup includes external research and personal explanations. Linux privilege escalation refers to the unauthorized act of gaining ...
Introduction: Challenge Link: Forensics The challenge is to analyze the memory dump of a compromised system. Volatility Overview: Volatility 3 is an open-source memory forensics framework used t...
Objective Challenge Link: Pyrat There is an open HTTP server that has a python code execution vulnerability. Exploit this vulnerability to gain a shell to target machine, search for a credentials...
Objective Challenge Link: Blaster The room objective is to look for alternative modes of exploitation without the use of Metasploit or any exploitation tools in general beyond nmap and dirbuster. ...
Objective Challenge Link: Cheese CTF Hack into the machine and get the flags. Enumeration Start by enumerating the target machine There are a lot of open ports, and that could be the use of P...