Feb 2 · 4 min read · Introduction I recently signed up for TryHackMe to learn some basic pen-testing skills and improve my Linux knowledge. Besides targeted training courses, the platform offers challenges of varying difficulty levels and topics. A cool feature is that y...
Join discussionJan 3 · 3 min read · LINK - https://tryhackme.com/room/colddboxeasy OVERVIEW We are given an IP Address Let’s scan it using NMAP ENUMERATION So we have two open ports PORT 80 and PORT 4512 of web and ssh respectivelyAlso we can see the website is running WordPress 4.1...
Join discussion
Sep 4, 2025 · 3 min read · Lab Link : Cypher Anxiety » CyberTalents Introduction In this challenge, we were provided with a packet capture (find the image.pcap). The objective was to analyze the network traffic, uncover hidden communication, and ultimately recover a transferre...
Join discussion
Aug 28, 2025 · 3 min read · LINK - https://tryhackme.com/room/smaggrotto RECON/SCANNING So First We Will Run Nmap/NmapAutomator to scan the target for open ports. So as you can see we got two open ports . WEB ENUMERATION Now Let’s Check out Port 80 First . Got a Web Page So...
Join discussion
Aug 21, 2025 · 5 min read · INFO: Ports and Services 53/tcp open domain 88/tcp open kerberos-sec 135/tcp open msrpc 139/tcp open netbios-ssn 389/tcp open ldap 445/tcp open microsoft-ds 464/tcp open kpasswd5 593/tcp open http-rpc-epmap 636/tcp open ldapssl 32...
Join discussion
Aug 5, 2025 · 8 min read · NMAP Puertos y servicios identificados con el escaneo inicial dando a entender un contexto claro de un entorno Windows Active Directory: 21/tcp open ftp 53/tcp open domain 80/tcp open http 88/tcp open kerberos-sec 135/tcp open msrpc 139...
Join discussion
Jul 16, 2025 · 3 min read · Box Summary The box had an LFI in a web dashboard that allowed log poisoning, leading to a shell as www-data. From there, I found sadm was a trusted user via rlogin, so I created a local user with the same name and logged in without a password. Insid...
Join discussion