TryHackMe - Couch
Description Hello hackers, I hope you are doing well. We are doing Couch from TryHackMe. Enumeration nmap We start a nmap scan using the following command: sudo nmap -sC -sV -T4 -p- {targ...
Description Hello hackers, I hope you are doing well. We are doing Couch from TryHackMe. Enumeration nmap We start a nmap scan using the following command: sudo nmap -sC -sV -T4 -p- {targ...
Description Hello hackers, I hope you are doing well. We are doing Road from TryHackMe. In this machine, we find a web application with a reset password feature that we exploit to reset the ...
Description Hello hackers, I hope you are doing well. We are doing Kiba from TryHackMe. The target is running a web application vulnerable to command execution which we use to get a reverse ...
Description Hello hackers, I hope you are doing well. We are doing CMesS from TryHackMe. The target is running a web server on port 80, we enumerate for subdomains and discover on where we f...
Description Hello hackers, I hope you are doing well. We are doing Tech_Supp0rt: 1 from TryHackMe. After scanning the machine, we find an smb share accessible without a password, and there w...
Description Hello hackers, I hope you are doing well. We are doing Ninja Skills from TryHackMe. Q1 Which of the above files are owned by the best-group group. We’re gonna use find with th...
Description Hello hackers, I hope you are doing well. We are doing Team from TryHackMe. After scanning the machine and finding a webserver, we discover a subdomain vulnerable to lfi giving t...
Description Hello hackers, I hope you are doing well. We are doing Market Place from TryHackMe. The machine is running a web server with couple of vulnerabilities. We start by exploiting a X...
Description Hello hackers, I hope you are doing well. We are doing Fowsniff CTF from TryHackMe. Fowsniff suffered from a data breach where username, emails and passwords got leaked, we brute...
Description Hello hackers, I hope you are doing well. We are doing 0day from TryHackMe. We exploit a shell shock vulnerability and get a reverse shell on the target, then we exploit an oudat...