Capture The Flag

Tryhackme - Bolt

Tryhackme – Bolt

In this walk through, we will be going through the Bolt room from Tryhackme. This room covers the exploitation of the Bolt CMS with an authenticated Remote Code Execution exploit. The room expect basic enumeration skills and usage of the exploitation framework like Metasploit. So, let’s get started. Machine Info: Title Bolt IPaddress 10.10.236.41 Difficulty […]

Tryhackme – Bolt Read More »

Tryhackme - Boiler CTF

Tryhackme – Boiler CTF

In this walk through, we will be going through the Boiler CTF room from Tryhackme. It is a medium rated box on the platforms and demands skills in enumeration, finding public exploits and how to leverage the basics privilege escalation vectors. Beware of the trolls and rabbit hole the box gives you. On that basis,

Tryhackme – Boiler CTF Read More »

Tryhackme - Blue

Tryhackme – Blue

In this walk through, we will be going through the Blue room from Tryhackme. This room has a Windows box which is vulnerable to the infamous Eternal Blue Vulnerability, which was responsible for the Wannacry ransomware attack. It will teach you the basic enumeration with nmap and focuses heavily on the exploitation framework Metasploit. After

Tryhackme – Blue Read More »

Tryhackme - Blaster

Tryhackme – Blaster

In this walk through, we will be going through the Blaster room from Tryhackme. This is a easy Windows box focusing again on basics and use of tools like Nmap, Gobuster and Metasploit. It also leverages a privilege section which gives some insight into Windows Priv esc realm. That’s it for a mandatory introduction of

Tryhackme – Blaster Read More »

Tryhackme - Agent Sudo

Tryhackme – Agent Sudo

In this walk through, we will be going through the Agent Sudo room from Tryhackme. The room covers basic enumeration, getting initial access with some bruteforce and then elevating privileges by abusing the sudo binary. Overall, it is a fun beginner level room which will covers varies basic topics and will test your methodology. So,

Tryhackme – Agent Sudo Read More »

Tryhackme - c4ptur3-th3-fl4g

Tryhackme – c4ptur3-th3-fl4g

In this walkthrough, we will be going through c4ptur3-th3-fl4g room by Tryhackme. This room covers the decoding of the most common encoding algorithms that we come across in a CTF or pentest scenarios. Along with, extracting hidden information from audio tracks and images. So, let’s get started. Resources: Binary to text: Rapidtables Swiss army knife

Tryhackme – c4ptur3-th3-fl4g Read More »

Scroll to Top