<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>TryHackMe.com on Stumbling Through Cybersecurity</title><link>https://www.allfun.blog/writeups/tryhackme/</link><description>Recent content in TryHackMe.com on Stumbling Through Cybersecurity</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Sat, 15 Jan 2022 00:00:00 +0000</lastBuildDate><atom:link href="https://www.allfun.blog/writeups/tryhackme/index.xml" rel="self" type="application/rss+xml"/><item><title>Hamlet</title><link>https://www.allfun.blog/writeups/tryhackme/hamlet/</link><pubDate>Sat, 15 Jan 2022 00:00:00 +0000</pubDate><guid>https://www.allfun.blog/writeups/tryhackme/hamlet/</guid><description>Recon to foothold Let&amp;rsquo;s begin with a scan, first masscan
rob:~/ $ sudo masscan -p1-65535,U:1-65535 10.10.34.135 --rate=1000 -e tun0 Starting masscan 1.3.2 (http://bit.ly/14GZzcT) at 2022-01-15 21:04:27 GMT Initiating SYN Stealth Scan Scanning 1 hosts [131070 ports/host] Discovered open port 8080/tcp on 10.10.34.135 Discovered open port 501/tcp on 10.10.34.135 Discovered open port 8000/tcp on 10.10.34.135 Discovered open port 21/tcp on 10.10.34.135 Discovered open port 80/tcp on 10.10.34.135 Discovered open port 22/tcp on 10.</description></item><item><title>ContainMe</title><link>https://www.allfun.blog/writeups/tryhackme/contain-me/</link><pubDate>Fri, 19 Nov 2021 00:00:00 +0000</pubDate><guid>https://www.allfun.blog/writeups/tryhackme/contain-me/</guid><description>Recon to foothold We&amp;rsquo;ll start with a comprehensive scan
rob:ContainMe/ $ sudo masscan -p1-65535,U:1-65535 10.10.235.206 --rate=1000 -e tun0 [sudo] password for rob: Starting masscan 1.3.2 (http://bit.ly/14GZzcT) at 2021-11-19 14:32:46 GMT Initiating SYN Stealth Scan Scanning 1 hosts [131070 ports/host] Discovered open port 2222/tcp on 10.10.235.206 Discovered open port 8022/tcp on 10.10.235.206 Discovered open port 22/tcp on 10.10.235.206 Discovered open port 80/tcp on 10.10.235.206 And now an nmap for the found ports</description></item><item><title>Temple</title><link>https://www.allfun.blog/writeups/tryhackme/temple/</link><pubDate>Thu, 18 Nov 2021 00:00:00 +0000</pubDate><guid>https://www.allfun.blog/writeups/tryhackme/temple/</guid><description>Another good box, perhaps more of a medium level than hard. Initial foothold needs long patient enumeration, wordlist choice is pretty key</description></item><item><title>Zeno</title><link>https://www.allfun.blog/writeups/tryhackme/zeno/</link><pubDate>Tue, 02 Nov 2021 00:00:00 +0000</pubDate><guid>https://www.allfun.blog/writeups/tryhackme/zeno/</guid><description>A good box that rewards thorough enumeration, medium level is about right although privesc to root is pretty simple</description></item><item><title>Uranium CTF</title><link>https://www.allfun.blog/writeups/tryhackme/uranium/</link><pubDate>Wed, 29 Sep 2021 00:00:00 +0000</pubDate><guid>https://www.allfun.blog/writeups/tryhackme/uranium/</guid><description>Recon to foothold We are given an employee&amp;rsquo;s Twitter account, hakanbey, so let&amp;rsquo;s start there and look for potentially useful snippets
We get a hostname to add to /etc/hosts We find an invitation to send an XSS or similar attack That&amp;rsquo;s about all we can extract from the Twitter account, let&amp;rsquo;s have a look at the deployed machine now, starting as always with a scan</description></item><item><title>Empline</title><link>https://www.allfun.blog/writeups/tryhackme/empline/</link><pubDate>Tue, 28 Sep 2021 00:00:00 +0000</pubDate><guid>https://www.allfun.blog/writeups/tryhackme/empline/</guid><description>A fairly easy &amp;lsquo;medium&amp;rsquo; box, once the couple of key concepts used are known. Very good CVE to demonstrate and good to read deeper on as a directory traversal example</description></item><item><title>GameBuzz</title><link>https://www.allfun.blog/writeups/tryhackme/game-buzz/</link><pubDate>Tue, 28 Sep 2021 00:00:00 +0000</pubDate><guid>https://www.allfun.blog/writeups/tryhackme/game-buzz/</guid><description>This box shows it pays to check &lt;em>every&lt;/em> link during enumeration (tip: spidering). The box is probably pitched too high at hard, it&amp;rsquo;s more of a medium box imho</description></item><item><title>CMSpit</title><link>https://www.allfun.blog/writeups/tryhackme/cmspit/</link><pubDate>Sat, 25 Sep 2021 00:00:00 +0000</pubDate><guid>https://www.allfun.blog/writeups/tryhackme/cmspit/</guid><description>A box rated medium, but given the needed CVE leaps off the google search pages there isn&amp;rsquo;t a huge challenge to this one. Probably better rated as easy but still a good, well-put-together room</description></item><item><title>Fortress</title><link>https://www.allfun.blog/writeups/tryhackme/fortress/</link><pubDate>Sat, 25 Sep 2021 00:00:00 +0000</pubDate><guid>https://www.allfun.blog/writeups/tryhackme/fortress/</guid><description>Recon to foothold First off we&amp;rsquo;ll take the information given and add the hostnames fortress and temple.fortress to our /etc/hosts file
Now let&amp;rsquo;s scan to find what we&amp;rsquo;re dealing with. A masscan to start
rob:Fortress/ $ sudo masscan -p1-65535,U:1-65535 10.10.6.73 --rate=1000 -e tun0 [sudo] password for rob: Starting masscan 1.3.2 (http://bit.ly/14GZzcT) at 2021-09-25 15:23:25 GMT Initiating SYN Stealth Scan Scanning 1 hosts [131070 ports/host] Discovered open port 5581/tcp on 10.10.6.73 Discovered open port 22/tcp on 10.</description></item><item><title>Crocc Crew</title><link>https://www.allfun.blog/writeups/tryhackme/crocc-crew/</link><pubDate>Thu, 23 Sep 2021 00:00:00 +0000</pubDate><guid>https://www.allfun.blog/writeups/tryhackme/crocc-crew/</guid><description>Difficult in 2 ways. A very sneakily hidden initial clue and then a complex escalation path, for me at least!</description></item><item><title>Sweettooth Inc.</title><link>https://www.allfun.blog/writeups/tryhackme/sweettooth/</link><pubDate>Wed, 28 Jul 2021 00:00:00 +0000</pubDate><guid>https://www.allfun.blog/writeups/tryhackme/sweettooth/</guid><description>The container escape can be tricky if you take the harder route :smile: justifying the &amp;lsquo;medium&amp;rsquo; difficulty tag</description></item><item><title>Rocket</title><link>https://www.allfun.blog/writeups/tryhackme/rocket/</link><pubDate>Thu, 22 Jul 2021 00:00:00 +0000</pubDate><guid>https://www.allfun.blog/writeups/tryhackme/rocket/</guid><description>Rated hard, that seems fair! It&amp;rsquo;s a tough one with many steps and lots to research. Excellent box to root, learned a lot</description></item><item><title>Metamorphosis</title><link>https://www.allfun.blog/writeups/tryhackme/metamorphosis/</link><pubDate>Wed, 21 Jul 2021 00:00:00 +0000</pubDate><guid>https://www.allfun.blog/writeups/tryhackme/metamorphosis/</guid><description>Part of Incognito CTF. A clever box, rated medium, with a simple but effective route to root. Probably about the right level</description></item><item><title>RazorBlack</title><link>https://www.allfun.blog/writeups/tryhackme/razorblack/</link><pubDate>Wed, 21 Jul 2021 00:00:00 +0000</pubDate><guid>https://www.allfun.blog/writeups/tryhackme/razorblack/</guid><description>A windows machine, rated medium, this box is pretty hard at times if your Windows skills are not fantastic (like me!). A lot of fun though and excellently made</description></item><item><title>Year of the Jellyfish</title><link>https://www.allfun.blog/writeups/tryhackme/year-of-the-jellyfish/</link><pubDate>Mon, 26 Apr 2021 17:37:52 +0000</pubDate><guid>https://www.allfun.blog/writeups/tryhackme/year-of-the-jellyfish/</guid><description>Another box in the &amp;lsquo;New Year&amp;rsquo; series by MuirlandOracle. This box is rated hard, but to my mind is not as difficult as some of the other machines in the series</description></item><item><title>Year of the Owl</title><link>https://www.allfun.blog/writeups/tryhackme/year-of-the-owl/</link><pubDate>Fri, 13 Nov 2020 00:00:00 +0000</pubDate><guid>https://www.allfun.blog/writeups/tryhackme/year-of-the-owl/</guid><description>A room by MuirlandOracle, rated hard, with a very tricky foothold but then pretty straightforward for a Windows machine</description></item><item><title>Year of the Fox</title><link>https://www.allfun.blog/writeups/tryhackme/year-fox/</link><pubDate>Fri, 19 Jun 2020 00:00:00 +0000</pubDate><guid>https://www.allfun.blog/writeups/tryhackme/year-fox/</guid><description>A &amp;lsquo;New Year&amp;rsquo; series room by MuirlandOracle, rated hard, complete with many rabbitholes and tricks. This one took a while!</description></item></channel></rss>