Skip to content
pentestguides.com
  • CTF & Bug Bounty
    • Bug Bounty
      • Bug Bounty Cheatsheets
      • My Bug Bounty Experience
    • Hack The Box
      • HTB Machines
      • HTB Challenges
    • TryHackMe
      • THM Challenges
  • Pentest Methodology
    • Pentest Tools
      • Networking
      • Password Attacks
      • Web
  • Fundamentals
    • Linux Commands
  • Dev & Scripting
    • Coding Challenges
      • Code Golf Cheatsheet
      • Breaking Browser Games
      • Clash of Code
  • Toolbox

pentestguides

Lo-Fi Writeup on TryHackMe – File Inclusion

February 16, 2026February 6, 2026 by pentestguides
Lo-Fi TryHackMe official image

This writeup covers the solution of Lo-Fi room on TryHackMe. A PHP File Inclusion along with path traversal allow us to read the flag.

Categories TryHackMe Challenge Tags arbitrary file read, ctf, file inclusion, lfi, path traversal, php, tryhackme, web Leave a comment

TryHackMe TakeOver Writeup – Subdomain Challenge

February 16, 2026February 5, 2026 by pentestguides
TakeOver TryHackMe challenge official image

Full writeup of TakeOver from TryHackMe. Subdomain enumeration and TLS certificate inspection leads to the discovery of a secret subdomain

Categories TryHackMe Challenge Tags ctf, ffuf, https, nmap, ssl, ssl certificate, subdomain takeover, takeover, tls, tls certificate, tryhackme Leave a comment

TryHackMe “Agent T” Writeup – Easy Challenge

February 16, 2026February 4, 2026 by pentestguides
TryHackMe Agent T official image

Writeup of TryHackMe challenge “Agent T”. We exploit the backdoored version of PHP 8.1.0-dev to get Code Execution and read the flag.

Categories TryHackMe Challenge Tags backdoor, backdoored php, ctf, nc, nmap, php, reverse shell, tryhackme, web Leave a comment

TryHackMe Compiled Challenge – Writeup

February 3, 2026 by pentestguides
Compiled challenge from TryHackMe - official logo

This writeup shows how to solve the TryHackMe challenge “Compiled”, by extracting the flag from the strings of a compiled program

Categories TryHackMe Challenge Tags binary, compiled, ctf, program, strings, tryhackme Leave a comment

Lazy Admin Writeup – TryHacKme Challenge

February 15, 2026February 2, 2026 by pentestguides
Lazy Admin TryHackMe Challenge

In this post, we solve the Lazy Admin CTF from TryHackMe by exploiting 2 CVE of SweetRice CMS and a sudo misconfiguration to get root.

Categories TryHackMe Challenge Tags cms, ctf, ffuf, mysql, nmap, php, reverse shell, sql, sudo, sweetrice, tryhackme, web Leave a comment

wafw00f – Detect WAF (Web Application Firewalls)

February 1, 2026 by pentestguides
wafw00f - pentesting tool to detect WAF

In this tutorial, we’ll see how to use wafw00f, a Kali Linux pentesting tool, to detect WAF (Web Application Firewalls) used by websites.

Categories Pentest Tools - Web Tags bug bounty, cloudflare, firewall, kali linux, pentesting, reconnaissance, waf, wafw00f, web, web application firewall Leave a comment

whatweb Tutorial: Identify Website Technologies

January 31, 2026January 31, 2026 by pentestguides
Whatweb - Linux Web Pentesting tool

whatweb is a Linux pentesting tool that detects the technologies and frameworks of websites: HTTP servers, CMS like Wordpress, Javascript, etc.

Categories Pentest Tools - Web Tags cms, ctf, http headers, http server, joomla, linux, pentesting, php, web, whatweb, wordpress Leave a comment

Pickle Rick Writeup – Easy TryHacKme CTF

February 16, 2026January 29, 2026 by pentestguides
TryHackMe Pickle Rick CTF image

Pickle Rick is a very easy TryHackMe CTF. We complete it by accessing a web portal, getting a reverse shell and exploiting sudo to become root.

Categories TryHackMe Challenge Tags ctf, curl, ffuf, find, html, nc, php, python, reverse shell, sudo, tryhackme, web Leave a comment

Neighbour Writeup – Easy IDOR TryHacKme Challenge

February 16, 2026January 28, 2026 by pentestguides
TryHackMe Neighbour room

Detailed writeup of TryHackMe Neighbour room, where we exploit IDOR to display the admin profile and find the flag of the room.

Categories TryHackMe Challenge Tags ctf, curl, idor, php, tryhackme, web Leave a comment

Solving The Suspicious Domain – Hack The Box challenge

January 30, 2026January 27, 2026 by pentestguides
Domain icons created by Good Ware - Flaticon

The Suspicious Domain is a very easy challenge from Hack The Box where we retrieve information about the domain name alexmorgan-reviews.net

Categories Hack The Box Challenge Tags dns, domain name, hackthebox, whois Leave a comment
Older posts
Newer posts
← Previous Page1 Page2 Page3 Page4 Next →
  • Lookup TryHackme cover imageSolving Lookup – TryHackMe Challenge Writeup
    February 12, 2026
  • TryHackMe RootMe room official imageRootMe Writeup – Full TryHackMe CTF Solution
    February 8, 2026
  • Whatweb - Linux Web Pentesting toolwhatweb Tutorial: Identify Website Technologies
    January 31, 2026
  • Compiled challenge from TryHackMe - official logoTryHackMe Compiled Challenge – Writeup
    February 3, 2026
  • scp example command to copy a remote filescp Quick Tutorial – Transfer Files Securely Over SSH
    February 17, 2026
  • Hack The Box Conversor imageConversor Writeup – An Easy Linux Hack The Box Machine
    January 20, 2026
  • Code iconSolving ReactOOPS – Exploiting React2Shell on Hack The Box
    January 20, 2026

arbitrary file read backdoor binary brute forcing bug bounty bug bounty cheatsheet clash of code cms code golf ctf curl dns ffuf file transfer find ftp hackerone hackthebox hydra idor intigriti kali linux linux linux command nc nmap penetration testing pentest pentesting php privilege escalation python reconnaissance reverse shell scp sftp smb ssh sudo suid tcp tls tryhackme udp web

Legal notice
Privacy policy
Ethical Disclaimer & Terms of Use
About Us
Contact Us

This site is hosted on Hostinger ↗

© 2026 pentestguides.com • Built with GeneratePress