TryHackMe - Flatline
Description Hello hackers, I hope you are doing well. We are doing Flatline from TryHackMe. Enumeration nmap We start a nmap scan using the following command: sudo nmap -sC -sV -T4 -Pn {t...
Description Hello hackers, I hope you are doing well. We are doing Flatline from TryHackMe. Enumeration nmap We start a nmap scan using the following command: sudo nmap -sC -sV -T4 -Pn {t...
Description Hello hackers, I hope you are doing well. We are doing CyberCrafted from TryHackMe. Enumeration nmap We start a nmap scan using the following command: sudo nmap -sC -sV -T4 -p...
Description Hello hackers, I hope you are doing well. We are doing OhMyWebServer from TryHackMe. Enumeration nmap We start a nmap scan using the following command: sudo nmap -sC -sV -T4 {...
Description Hello hackers, I hope you are doing well. We are doing Library from TryHackMe. The machine is running ssh and a web server, we find a username in the web page then brute force th...
Description Hello hackers, I hope you are doing well. We are doing Plotted-TMS from TryHackMe. The target is running a web application vulnerable to remote code execution giving us the initi...
Description Hello hackers, I hope you are doing well. We are doing Ha Joker CTF from TryHackMe. Enumeration nmap We start a nmap scan using the following command: sudo nmap -sC -sV -T4 {t...
Description Hello hackers, I hope you are doing well. We are doing Dav from TryHackMe. The machine is running a web server with webdav that uses default credentials, allowing us to upload a ...
Description Hello hackers, I hope you are doing well. We are doing Glitch from TryHackMe. The machine is running a NodeJS application with a vulnerable api that we use to get foothold. After...
Description Hello hackers, I hope you are doing well. We are doing Cat Pictures from TryHackMe. In this machine, we get to use a technique called port knocking that would make a port open au...
Description Hello hackers, I hope you are doing well. We are doing Poster from TryHackMe. The target is running a database that uses weak credentials for authentication, we brute force that ...