TryHackMe - Mr.Robot
A detailed writeup for the TryHackMe Mr. Robot room. This walkthrough covers everything from initial reconnaissance and exploiting a WordPress site to gaining a root shell through privilege escalation.
A detailed writeup for the TryHackMe Mr. Robot room. This walkthrough covers everything from initial reconnaissance and exploiting a WordPress site to gaining a root shell through privilege escalation.
A detailed writeup on how to solve the Hack The Box 'Artificial' machine. This post covers gaining initial access through a TensorFlow model RCE, escalating privileges to the 'gael' user by cracking a password found in a database, and finally achieving root access by exploiting a 'backrest' backup service to retrieve the root user's SSH key.
A step-by-step guide on how to solve the Hack The Box 'Cap' machine. This write-up covers the initial foothold by analyzing a pcap file to find FTP credentials and privilege escalation by exploiting python capabilities.
A step-by-step guide on how to solve the TryHackMe 'Publisher' room. This write-up covers the initial foothold using a CVE in SPIP CMS and privilege escalation by bypassing AppArmor restrictions.
This post provides a step-by-step write-up for the TryHackMe 'Couch' room. Learn how to find credentials in a CouchDB database and escalate privileges to root by leveraging an insecure Docker port.
A detailed writeup on the TryHackMe Archangel room. This walkthrough covers exploiting a Local File Inclusion (LFI) vulnerability to gain initial access through Apache log poisoning, and escalating privileges to root via a cronjob and PATH hijacking.
A step-by-step guide to completing the TryHackMe GamingServer room. This walkthrough covers reconnaissance, gaining initial access, and escalating privileges using the LXD vulnerability.
A step-by-step guide to solving the b3dr0ck room on TryHackMe.
This article provides a detailed walkthrough for the 'Year of the Rabbit' room on TryHackMe. We'll start by uncovering hidden web pages and using BurpSuite to intercept traffic, leading us to credentials hidden within an image. From there, we'll gain initial access via FTP and finally escalate our privileges to root by exploiting a specific sudo vulnerability.
A full writeup for the TryHackMe Fowsniff CTF. Learn how to go from leaked credentials to root access by cracking MD5 hashes, pivoting from POP3 to SSH, and exploiting a writable MOTD script.