
TryHackMe Fusion Corp
Room link: https://tryhackme.com/room/fusioncorp Initial Scan # Nmap 7.95 scan initiated Thu Jul 3 22:12:44 2025 as: /usr/lib/nmap/nmap -sS -sC -sV -T4 -p- -oN nmap.txt 10.10.26.151 Nmap scan re...
Room link: https://tryhackme.com/room/fusioncorp Initial Scan # Nmap 7.95 scan initiated Thu Jul 3 22:12:44 2025 as: /usr/lib/nmap/nmap -sS -sC -sV -T4 -p- -oN nmap.txt 10.10.26.151 Nmap scan re...
Room link: https://tryhackme.com/room/internal Firstly, add internal.thm to /etc/hosts Initial scan 2 open ports: 22 | SSH 80 | HTTP Enumeration Enumerating web directories using gob...
Room link: https://tryhackme.com/room/raz0rblack Initial scan $ nmap -sS -sC -sV -T4 -p- $ip Nmap scan report for 10.10.209.247 Host is up (0.021s latency). Not shown: 65508 closed tcp ports (res...
Room link: https://tryhackme.com/room/0day This room started from enumerating the webpage to finding its vulnerability (CVE-2014-6271 - Shellshock) and exploiting it gaining shell. From there, a k...
This room started from cookie manipulation leading to decoding a cipher. Decoded data used to gain SSH shell. Then after analyzing binary exploited it using buffer overflow. Root escalation privile...
Enumeration We starting with nmap scan: nmap -sS -sC -sV -T4 -Pn -p- <target> Found 3 open ports: 22 (SSH) 80 (HTTP) 8009 (AJP13) We have interesting directory (manager). Let’s ...
Analyzing file First, download provided .pcap file After downloading pcap file and opening it with wireshark follow tcp stream that contains encrypted traffic. Notice that stream starts with JFI...
Enumeration Let’s start from nmap scan: Discovered 2 open ports: 22 (SSH) 80 (HTTP) Web analysis Tried to run gobuster to enumerate directories but it didnt found anything, let’s check ...