Skip to content

Simple, no BS, easy to understand TryHackMe walkthorughs.

Notifications You must be signed in to change notification settings

rubalsxngh/TryHackMe_Walkthroughs

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

TryHackMe Walkthroughs

Welcome to the TryHackMe Walkthroughs repository! This repo contains detailed walkthroughs for various challenges and rooms on TryHackMe, a platform for learning and practicing cybersecurity skills.

Overview

This repository is designed to help beginners and intermediate users understand and solve TryHackMe challenges by providing step-by-step guides. Each walkthrough includes detailed explanations of the techniques and tools used, making it easier to follow along and learn.

Contents

  • RootMe: An easy difficulty CTF challenge that involves exploiting a file upload vulnerability to gain a reverse shell and performing privilege escalation on an executable Python binary.

  • SimpleCTF: An easy CTF challenge on TryHackMe, features an FTP anonymous login misconfiguration allowing unauthorized access without credentials. Exploited this to gain an FTP shell, discovered user mitch's file, executed SSH bruteforce, and achieved privilege escalation via vim.

  • Intermediate_Nmap: An easy difficulty CTF challenge on TryHackMe. This machine require nmap, netcat skills to gain the machine login username and password further ssh to capture the flag.

  • Blue: An easy difficulty walkthrough on TryHackMe. This machine suffers with EternalBlue which allows attacker to run arbitrary code on remote machine targetting SMB service running on port 445. When exploited, EternalBlue gives command shell that can be converted into meterpreter shell.

More walkthroughs will be added soon!

About

Simple, no BS, easy to understand TryHackMe walkthorughs.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published