logo

HAMMER | THM Writeup

Hammer started with discovering a log file on the web application with fuzzing and an email address inside. With a valid email address in hand, we were able to request a password reset for the user. After bypassing the rate limit to be able to brute-force the password recovery code, we were successful in resetting the password for the user and accessing the dashboard. After gaining access to the dashboard, we used forged JWTs to escalate our role from user to admin to be able to run commands and completed the room.
7 minutes to read

U.A. High School | THM Writeup

Introduction Detailed walkthroughs for U.A. High School CTF challenges on TryHackMe . Summary This CTF challenge required participants to identify and exploit a hidden OS command injection vulnerability in the U.A. Superhero Academy’s website. Successful exploitation led to gaining root privileges on the system. Vulnerability The website contains a hidden functionality that allows for the execution of shell commands. This vulnerability can be exploited to gain unauthorized access to the system.
7 minutes to read

Nessus Installation Guide

Intro Nessus is a proprietary vulnerability scanner developed by Tenable, Inc. This blog is about the installation of Nessus Essentials on Linux. Installation Register First lets register in Tenable Nessus Essentials to get the activation code. Tenable Nessus Essentials Enter your information in the register form shown above, click Get Started. Download Nessus Mail with Activation Code We should have received a mail with Activation Code. Note down the activation code and click the Download Nessus for the downloading page.
2 minutes to read

Airplane | THM Writeup

Introduction Detailed walkthroughs for Airplane CTF challenges on TryHackMe . Tools Used rustscan, ffuf, nessus, curl, nc, gdb, ssh-keygen, ssh Enumeration Lets start the process by mapping host-name to target IP address. sudo echo "10.10.249.133 airplane.thm" >> /etc/hosts Rustscan Let’s start enumaration process using rustscan portscanner. $ rustscan -a airplane.thm – -sC -sV Open 10.10.249.133:22 Open 10.10.249.133:6048 Open 10.10.249.133:8000 [~] Starting Script(s) [>] Running script "nmap -vvv -p {{port}} {{ip}} -sC -sV" on ip 10.
6 minutes to read

New York Flankees | THM Writeup

Introduction Detailed walkthrough for New York Flankees CTF challenges on TryHackMe . Tools Used rustscan, burpsuite Enumeration Lets start the process by mapping host-name to target IP address. sudo echo "10.10.140.44 nythm.com" >> /etc/hosts Let’s start enumaration process using rustscan portscanner. rustscan -a nythm.com – -sC -sV .—-. .-. .-. .—-..—. .—-. .—. .–. .-. .-. | {} }| { } |{ {__ {_ }{ {_ / ___} / {} | `| | | .
5 minutes to read

CyberLens CTF |THM Writeup

Introduction Detailed walkthrough for CyberLens CTF challenges on TryHackMe . Tools Used rustscan, ping, burpsuite, nc, metasploit, msfvenom. Enumeration Lets start the process by mapping host-name to target IP address. mapping cyberlens.thm to the target IP address When any user or application on the system tries to access cyberlens.thm, it will be directed to the IP address specified in the /etc/hosts file. Lets use rustscan for port scanning the target domain.
4 minutes to read