TryHackMe - Glitch
Description Hello hackers, I hope you are doing well. We are doing Glitch from TryHackMe. The machine is running a NodeJS application with a vulnerable api that we use to get foothold. After...
Description Hello hackers, I hope you are doing well. We are doing Glitch from TryHackMe. The machine is running a NodeJS application with a vulnerable api that we use to get foothold. After...
Description Hello hackers, I hope you are doing well. We are doing Cat Pictures from TryHackMe. In this machine, we get to use a technique called port knocking that would make a port open au...
Description Hello hackers, I hope you are doing well. We are doing Poster from TryHackMe. The target is running a database that uses weak credentials for authentication, we brute force that ...
Description Hello hackers, I hope you are doing well. We are doing GoldenEye from TryHackMe. Enumeration nmap We start a nmap scan for all ports using the following command: sudo nmap --m...
Description Hello hackers, I hope you are doing well. We are doing VulnNet: Internal from TryHackMe. The target is running multiple services each one has it’s own weaknesses. After jumping f...
Description Hello hackers, I hope you are doing well. We are doing Gallery from TryHackMe. The target is running a web server with a CMS that has a login page vulnerable to sql injection. Af...
Description Hello hackers, I hope you are doing well. We are doing Jack-of-All-Trades from TryHackMe. Enumeration nmap We start a nmap scan using the following command: sudo nmap -sC -sV ...
Description Hello hackers, I hope you are doing well. We are doing Corridor from TryHackMe. In this challenge, you will explore potential IDOR vulnerabilities. Examine the URL endpoints you ...
Description Hello hackers, I hope you are doing well. We are doing Madness from TryHackMe. Enumeration nmap We start a nmap scan using the following command: sudo nmap -sC -sV -T4 {target...
Description Hello hackers, I hope you are doing well. We are doing Gotta Catch’em All! from TryHackMe. Enumeration nmap We start a nmap scan using the following command: sudo nmap -sC -sV...