Skip to content

Latest commit

 

History

History
21 lines (10 loc) · 1.8 KB

README.md

File metadata and controls

21 lines (10 loc) · 1.8 KB

TryHackMe Walkthroughs

Welcome to the TryHackMe Walkthroughs repository! This repo contains detailed walkthroughs for various challenges and rooms on TryHackMe, a platform for learning and practicing cybersecurity skills.

Overview

This repository is designed to help beginners and intermediate users understand and solve TryHackMe challenges by providing step-by-step guides. Each walkthrough includes detailed explanations of the techniques and tools used, making it easier to follow along and learn.

Contents

  • RootMe: An easy difficulty CTF challenge that involves exploiting a file upload vulnerability to gain a reverse shell and performing privilege escalation on an executable Python binary.

  • SimpleCTF: An easy CTF challenge on TryHackMe, features an FTP anonymous login misconfiguration allowing unauthorized access without credentials. Exploited this to gain an FTP shell, discovered user mitch's file, executed SSH bruteforce, and achieved privilege escalation via vim.

  • Intermediate_Nmap: An easy difficulty CTF challenge on TryHackMe. This machine require nmap, netcat skills to gain the machine login username and password further ssh to capture the flag.

  • Blue: An easy difficulty walkthrough on TryHackMe. This machine suffers with EternalBlue which allows attacker to run arbitrary code on remote machine targetting SMB service running on port 445. When exploited, EternalBlue gives command shell that can be converted into meterpreter shell.

More walkthroughs will be added soon!