TryHackMe - OSI Model - Writeup
July 6, 2021OSI Model
Learn about the fundamental networking framework that determines the various stages in which data is handled across a network
A bunch of Bug bounty, CTFs, TryHacMe, Hack the box walkthroughs write-ups
OSI Model
Learn about the fundamental networking framework that determines the various stages in which data is handled across a network
Git and Crumpets
Our devs have been clamoring for some centralized version control, so the admin came through. Rumour has it that they included a few countermeasures…
Couch
Hack into a vulnerable database server that collects and stores data in JSON-based document formats, in this semi-guided challenge.
Polkit: CVE-2021-3560
Walkthrough room for CVE-2021-3560
A ctf for beginners, can you root me?
Introduction to the Windows operating system.
A popular juice shop has been breached! Analyze the logs to see what had happened…
This room is aimed for beginner level hackers but anyone can try to hack this box. There are two main intended ways to root the box.
A beginner level security challenge
You talked a big game about being the most elite hacker in the solar system. Prove it and claim your right to the status of Elite Bounty Hacker!
After the previous breach, VulnNet Entertainment states it won’t happen again. Can you prove they’re wrong?
Exploit Ubuntu, like a Turtle in a Hurricane
Easy boot2root Machine
Avengers Blog
Learn to hack into Tony Stark’s machine! You will enumerate the machine, bypass a login portal via SQL injection and gain root access by command injection.
I made a forum where you can post cute cat pictures!
Penetration Testing Challenge
Overpass has been hacked! Can you analyse the attacker’s actions and hack back in?
Compromise a Joomla CMS account via SQLi, practise cracking hashes and escalate your privileges by taking advantage of yum.
Try and find all the flags in the SQL Injections
Walkthrough on exploiting a Linux machine. Enumerate Samba for shares, manipulate a vulnerable version of proftpd and escalate your privileges with path variable manipulation.
First room of the Red Stone series. Hack ruby using ruby.
Exploit Jenkins to gain an initial shell, then escalate your privileges by exploiting Windows authentication tokens.