[TryHackMe] Skynet Walkthrough Using Remote File Inclusion

🔐 How I used a remote file inclusion vulnerability to hack and root the Terminator’s computer CHALLENGE OVERVIEW BACKGROUND In this walkthrough, we will root a terminator-themed capture-the-flag (CTF) challenge box. IPs ENUMERATION NMAP SCAN RESULTS Starting Nmap 7.92 ( https://nmap.org ) at 2023-01-23 18:33 EST Stats: 0:00:02 elapsed; 0 hosts completed (1 up), 1 … Read more

How I Hacked Into a Hosting Company and Exposed a Vulnerability (THM Overpass 3)

BOX OVERVIEW PREMISE This is the third and final installment of the Overpass challenges on TryHackMe. Here are the other two overpass walkthroughs, just in case you missed them: In today’s challenge, the team of comp-sci students is at it again with a new website hosting company. However, they haven’t learned much yet about security. … Read more

TryHackMe Overpass 2 – How I Found a Server Backdoor with Wireshark

Backdoors are malicious pieces of software that allow attackers to access computers without authorization and bypass security measures. They can control computers remotely, steal data, and bypass safety protocols. Challenge Overview 👉 Recommended Tutorial: How I Hacked a PW Manager (TryHackMe Overpass 1) PART 1 – FORENSICS Part one of this box can be completed … Read more

TryHackMe BadByte – How I Used Port Forwarding to Hack Into An Internal Site’s Server

Port forwarding is a networking technique that allows a user to access services on a computer or network behind a firewall or router. It opens up specific ports on a computer or network to allow external devices to connect and access services and applications on the internal network. Challenge Overview RECON Let’s start by noting … Read more