Solving Lookup – TryHackMe Challenge Writeup
Complete walkthrough of Lookup room on TryHackMe: form brute-forcing, elFinder CVE and 2 Linux misconfigurations lead us to the root flag.
Complete walkthrough of Lookup room on TryHackMe: form brute-forcing, elFinder CVE and 2 Linux misconfigurations lead us to the root flag.
Full walkthrough of the TryHackMe Basic Pentesting room: web enumeration, SMB usernames, SSH access and SSH private key brute-force.
Full walkthrough of RootMe: reconnaissance, getting a PHP shell then a reverse shell, and elevating our privileges through a SUID misconfiguration
Full walkthrough of the Corridor Challenge on TryHackMe. We find the flag by exploiting IDOR through a MD5 id in the URL of the web app.
This writeup covers the solution of Lo-Fi room on TryHackMe. A PHP File Inclusion along with path traversal allow us to read the flag.
Full writeup of TakeOver from TryHackMe. Subdomain enumeration and TLS certificate inspection leads to the discovery of a secret subdomain
Writeup of TryHackMe challenge “Agent T”. We exploit the backdoored version of PHP 8.1.0-dev to get Code Execution and read the flag.
This writeup shows how to solve the TryHackMe challenge “Compiled”, by extracting the flag from the strings of a compiled program
In this post, we solve the Lazy Admin CTF from TryHackMe by exploiting 2 CVE of SweetRice CMS and a sudo misconfiguration to get root.
Pickle Rick is a very easy TryHackMe CTF. We complete it by accessing a web portal, getting a reverse shell and exploiting sudo to become root.