Cybersecurity

Tryhackme - Startup

Tryhackme – Startup

In this walk through, we will be going through the Startup room from Tryhackme. This room is rated as easy on the platform and is based on the exploitation of an application of a newly launch startup called SpiceHut. We will go down the enumeration route, then the initial access and at last will perform

Tryhackme – Startup Read More »

Tryhackme - Source

Tryhackme – Source

In this walk through, we will be going through the Source room from Tryhackme. This room is rated as easy on the platform and is based on the exploitation of a recent vulnerability by hacking Webmin which is a web-based system configuration tool. On that note, let’s get started without any delay. Machine Info: Title

Tryhackme – Source Read More »

Tryhackme - Snort

Tryhackme – Snort

In this walk through, we will be going through the Snort room from Tryhackme. This room will teach us how to use Snort to detect real-time threats, analyse recorded traffic files and identify anomalies. On that note, let’s get started. Task 1 – Introduction Task 2 – Interactive Material and VM Question 1 – Navigate

Tryhackme – Snort Read More »

Tryhackme - Simple CTF

Tryhackme – Simple CTF

In this walk through, we will be going through the Simple CTF room from Tryhackme. This room is rated as easy on the platform and is directed towards beginners by testing their skills in enumeration, exploitation, and at last privilege escalation of a Linux server. On that note, let’s get started. Machine Info: Title EasyCTF

Tryhackme – Simple CTF Read More »

Scroll to Top