By Shamsher khan This is a Writeup of Tryhackme room “Team” Tryhackme Writeup
Room link: https://tryhackme.com/room/teamcw
Note: This room is Free
Add Target to /etc/hosts file
echo "10.10.132.103 team.thm" >> /etc/hosts
By Shamsher khan This is a Writeup of Tryhackme room “Linux Backdoors”
Room link: https://tryhackme.com/room/linuxbackdoors
Note: This room is Free
Hey everyone!
This room is dedicated for learning common Linux backdoors techniques! A backdoor is simply something we can do to ensure our consistent access to the machine.
So even if the machine is rebooted, shut down or whatever, we would still be able to have access to it.
These aren’t actual vulnerabilities but just ways to maintain your access on a target :)
To recreate all the backdoor techniques shown in this room, you could simply try them all…
By Shamsher khan This is a Writeup of Tryhackme room “THREAT INTELLIGENCE”
Room link: https://tryhackme.com/room/threatintelligence
Note: This room is Free
THREAT INTELLIGENCE: SUNBURST
This lab will try to walk an SOC Analyst through the steps that they would take to assist in breach mitigations and identifying important data from a Threat Intelligence report.
Lets try to define some of the words that we will encounter:
Red Team Tools: Red team tools are a set of programs that offensive security teams will use in pentesting engagements to assist a company in determining flaws in their procedures, policies, frameworks, tools, configurations, and…
By Shamsher khan This is a Writeup of Tryhackme room “CTF collection Vol.2”
Note: Please Complete CTF collection Vol.1 Before Vol.2
Room link: https://tryhackme.com/room/ctfcollectionvol2
Note: This room is Free
Difficulty: Medium
Welcome, welcome and welcome to another CTF collection. This is the second installment of the CTF collection series. For your information, the second serious focuses on the web-based challenge. There are a total of 20 easter eggs a.k.a flags can be found within the box. Let see how good is your CTF skill.
Now, deploy the machine and collect the eggs!
Warning: The challenge contains seizure images and background…
By Shamsher khan This is a Writeup of Tryhackme room “CTF Collection Vol.1”
Room link: https://tryhackme.com/room/ctfcollectionvol1
Note: This room is Free
Difficulty: Easy
Can you decode the following?
VEhNe2p1NTdfZDNjMGQzXzdoM19iNDUzfQ==
By Shamsher khan This is a Writeup of Tryhackme room “JPGChat”
Room link: https://tryhackme.com/room/jpgchat
Note: This room is Free
Add to the Hosts file
echo 10.10.185.12 jpgchat >> /etc/hosts
By Shamsher khan This is a Writeup of Tryhackme room “Lunizz CTF”
Room link: https://tryhackme.com/room/lunizzctfnd
Note: This room is Free
By Shamsher khan This is a Writeup of Tryhackme room “Classic Passwd”
Room link: https://tryhackme.com/room/classicpasswd
Note: This room is Free
Let’s do a dynamic analysis. Dynamic analysis has to be done in a sandbox environment. There are some tools pre-installed in Linux that can be used to display more detailed information.
First download the executable file. Check the file information using the following command
By Shamsher khan This is a Writeup of Tryhackme room “CC: Radare2”
Room link: https://tryhackme.com/room/ccradare2
Note: This room is Free
This room assumes that you have basic x86 assembly knowledge. If you do not I highly recommend doing the Intro to x86–64 room before completing this done.
This room is also not designed to be a 100% teach everything on radare2. It is designed to teach you how some of the more common things in radare2 are used.
The included zip file has all the binaries you will need for this exercise.
With that out of the way let’s get…
By Shamsher khan This is a Writeup of Tryhackme room “RustScan”
Room link: https://tryhackme.com/room/rustscan
Note: This room is free
RustScan is the modern day port scanner.
Capable of scanning targets in less than a second, extensible scripting language allowing you to write scripts in Python, and more.
This room will teach you all there is need to know about RustScan.
You can find RustScan’s GitHub repository here.
https://github.com/RustScan/RustScan
The installation procedure of RustScan is very easy.
Note: If you use Mac OS, Arch, Docker, Nix OS or any other operating system than Debian more install instructions can be found on…
Web Application Pen-tester || CTF Player || Security Analyst