<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Emanuele</title>
    <description>The latest articles on DEV Community by Emanuele (@shadownet0110).</description>
    <link>https://dev.to/shadownet0110</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3065347%2F316aeed0-8a08-4df6-83ab-717a981ebe1c.jpg</url>
      <title>DEV Community: Emanuele</title>
      <link>https://dev.to/shadownet0110</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/shadownet0110"/>
    <language>en</language>
    <item>
      <title>Learning Linux the Fun Way: TryHackMe Linux Fundamentals Part 1 Walkthrough</title>
      <dc:creator>Emanuele</dc:creator>
      <pubDate>Tue, 15 Jul 2025 14:46:20 +0000</pubDate>
      <link>https://dev.to/shadownet0110/learning-linux-the-fun-way-tryhackme-linux-fundamentals-part-1-walkthrough-a7b</link>
      <guid>https://dev.to/shadownet0110/learning-linux-the-fun-way-tryhackme-linux-fundamentals-part-1-walkthrough-a7b</guid>
      <description>&lt;p&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;As part of my journey into cybersecurity and system administration, I recently completed the "Linux Fundamentals Part 1" room on TryHackMe. This room is perfect for beginners who want to get hands-on with Linux basics in a guided, interactive environment.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;In this post, I’ll walk through the key concepts, commands, and tasks covered in the room, along with my personal notes and tips.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;A bit of Background on Linux&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;Linux may seem more intimidating than operating systems like Windows, but it's actually incredibly versatile and widely used in everyday life. You might not realize it, but Linux powers many of the systems you interact with regularly, such as websites, car infotainment systems, checkout tills in stores, and even critical infrastructure like traffic light controllers and industrial sensors.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;The term "Linux" refers to a family of operating systems based on UNIX. Because Linux is open-source, it has given rise to many different versions, known as distributions or "distros," each tailored for specific use cases. Ubuntu and Debian are two of the most common distributions due to their flexibility. For instance, Ubuntu can be used both as a server operating system for hosting websites and applications, or as a full desktop environment. Impressively, Ubuntu Server can run on systems with as little as 512MB of RAM. Just like Windows has different versions such as 7, 8, and 10, Linux has a wide variety of distributions, each suited to different needs and preferences.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj9bxp4r8to4o9f0mui6s.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj9bxp4r8to4o9f0mui6s.png" alt="task 2 answer" width="800" height="90"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Interacting With Your First Linux Machine (In-Browser)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;This TryHackMe room provides access to an Ubuntu Linux machine that you can interact with directly through your browser, making it easy to follow along with the learning material. To begin, you simply need to click the green “Start Machine” button. Once the machine is deployed, a card will appear at the top of the room displaying important details such as the machine’s IP address, an expiry timer, and controls to manage the machine. It’s important to remember to terminate the machine once you’re finished to avoid unnecessary resource usage. For now, just start the machine and you’ll be able to explore and practice Linux commands in a fully interactive environment, right from your browser.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fss13n8w97j1kyvlgwpf6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fss13n8w97j1kyvlgwpf6.png" alt="task 3 answer" width="800" height="344"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Running Your First few Commands&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Ubuntu is known for being lightweight, which makes it appealing, but this often means it lacks a graphical interface unless one is installed. As a result, users interact with the system primarily through the Terminal, a text-based interface that can seem intimidating at first. However, with time and practice, it becomes easier to use. Basic tasks like navigating files, viewing content, and creating files are done using simple commands. Two introductory commands are echo, which displays text, and whoami, which shows the current user. For example, echo Hello prints "Hello", while echo "Hello Friend!" prints the full phrase with spaces. The whoami command reveals the username of the logged-in user.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;To get information about current user, we use:&lt;/em&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;whoami
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;em&gt;To print infos in the terminal, we use &lt;code&gt;echo&lt;/code&gt; + information, in our case:&lt;/em&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;echo TryHackMe
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F95p02qgmtc0jt3s29z3j.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F95p02qgmtc0jt3s29z3j.png" alt="linux terminal task 4" width="800" height="685"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi6ao5eu2tims11nx7b62.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi6ao5eu2tims11nx7b62.png" alt="task 4 answers" width="800" height="233"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Interacting With the Filesystem!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;So far, only the &lt;code&gt;echo&lt;/code&gt; and &lt;code&gt;whoami&lt;/code&gt; commands have been introduced, which are useful but limited. To work effectively in a Linux environment without a graphical interface, it's essential to interact with the filesystem. This includes navigating directories, viewing file contents, and understanding where you are in the system.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;The &lt;code&gt;ls&lt;/code&gt; command lists files and folders in the current directory, helping you see what’s available. To move between directories, you use &lt;code&gt;cd&lt;/code&gt;, and once inside a directory, you can again use ls to view its contents. To read the contents of a file, the cat command is used, which outputs the file’s data directly in the terminal. Finally, &lt;code&gt;pwd&lt;/code&gt; shows the full path of your current location in the filesystem, which is helpful for orientation and navigation.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Let's navigate inside this machine to find our answers:&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhz556gaa593ntk50cqjv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhz556gaa593ntk50cqjv.png" alt="task 5" width="800" height="582"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fttwq4osvedb3ns9tpkd0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fttwq4osvedb3ns9tpkd0.png" alt="task 5 answers" width="800" height="471"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Searching for Files&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;Although Linux may seem complex at first, one of its greatest strengths is how efficient it becomes with familiarity. As you get used to it, commands like &lt;code&gt;echo&lt;/code&gt;, &lt;code&gt;whoami&lt;/code&gt;, &lt;code&gt;ls&lt;/code&gt;, &lt;code&gt;cd&lt;/code&gt;, &lt;code&gt;cat&lt;/code&gt;, and &lt;code&gt;pwd&lt;/code&gt; become second nature. To further boost efficiency, Linux offers powerful tools like &lt;code&gt;find&lt;/code&gt; and &lt;code&gt;grep&lt;/code&gt;.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;The &lt;code&gt;find&lt;/code&gt; command allows you to search for files across directories without manually navigating through each one. For example, &lt;code&gt;find -name passwords.txt&lt;/code&gt; searches for a file with that exact name, while &lt;code&gt;find -name *.txt&lt;/code&gt; finds all .txt files using a wildcard.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;On the other hand, &lt;code&gt;grep&lt;/code&gt; lets you search inside files for specific content. It's especially useful for large files like logs. For instance, &lt;code&gt;grep "81.143.211.90" access.log&lt;/code&gt; filters and displays only the lines containing that IP address, saving time and effort compared to reading the entire file.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Together, &lt;code&gt;find&lt;/code&gt; and &lt;code&gt;grep&lt;/code&gt; showcase how Linux can streamline tasks and make system interaction much more efficient.&lt;/em&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;grep "THM" access.log
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvb8w9lwk95e2tdwdlm07.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvb8w9lwk95e2tdwdlm07.png" alt="task 6" width="800" height="111"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fevdp3wg3uhfx4no7qzvs.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fevdp3wg3uhfx4no7qzvs.png" alt="task6 answers" width="800" height="271"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;An Introduction to Shell Operators&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;Linux operators enhance command-line efficiency by allowing more control over how commands are executed and how their outputs are handled. The &lt;code&gt;&amp;amp;&lt;/code&gt; operator runs commands in the background, which is useful for long tasks like copying large files without blocking the terminal. The &lt;code&gt;&amp;amp;&amp;amp;&lt;/code&gt; operator chains commands together, ensuring the second command runs only if the first succeeds.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;The &lt;code&gt;&amp;gt;&lt;/code&gt; operator redirects output to a file, replacing its contents if the file already exists. For example, &lt;code&gt;echo hey &amp;gt; welcome&lt;/code&gt; creates or overwrites the file "welcome" with the word "hey". In contrast, the &lt;code&gt;&amp;gt;&amp;gt;&lt;/code&gt; operator appends output to the end of a file without overwriting existing content. So, &lt;code&gt;echo hello &amp;gt;&amp;gt; welcome&lt;/code&gt; adds "hello" below "hey" in the same file.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;These operators are key tools for streamlining tasks and managing output effectively in Linux.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhdb0vt4ts6mf29z6gmvb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhdb0vt4ts6mf29z6gmvb.png" alt="task7 answers" width="800" height="515"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conclusions&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;Great job reaching this point! We've just completed a solid introduction to Linux, covering the most essential tools and concepts you'll use regularly. Here's a quick recap of what we've learned:&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why Linux is so widely used:&lt;/strong&gt; &lt;em&gt;Its efficiency, flexibility, and power make it a favorite in tech environments.&lt;/em&gt;&lt;br&gt;
&lt;strong&gt;Basic interaction:&lt;/strong&gt; &lt;em&gt;We’ve run your first commands and started navigating a Linux machine.&lt;/em&gt;&lt;br&gt;
&lt;strong&gt;Filesystem navigation:&lt;/strong&gt; &lt;em&gt;Commands like ls, cd, cat, and pwd help you explore and manage files.&lt;/em&gt;&lt;br&gt;
&lt;strong&gt;Efficient searching:&lt;/strong&gt; &lt;em&gt;Tools like find and grep let you locate files and search their contents quickly.&lt;/em&gt;&lt;br&gt;
&lt;strong&gt;Shell operators:&lt;/strong&gt; &lt;em&gt;We learned how to run commands in the background (&amp;amp;), chain them (&amp;amp;&amp;amp;), and redirect output (&amp;gt; and &amp;gt;&amp;gt;).&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;We're building a strong foundation, and with a bit of practice, these commands will become second nature. When you're ready, moving on to Linux Fundamentals Part 2 will deepen your skills even further.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>learning</category>
      <category>tryhackme</category>
      <category>cybersecurity</category>
      <category>linux</category>
    </item>
    <item>
      <title>TryHackMe's Intro to LAN - A Beginner Friendly Walkthrough</title>
      <dc:creator>Emanuele</dc:creator>
      <pubDate>Wed, 02 Jul 2025 15:09:11 +0000</pubDate>
      <link>https://dev.to/shadownet0110/tryhackmes-intro-to-lan-a-beginner-friendly-walkthrough-471i</link>
      <guid>https://dev.to/shadownet0110/tryhackmes-intro-to-lan-a-beginner-friendly-walkthrough-471i</guid>
      <description>&lt;p&gt;&lt;em&gt;The "Intro to LAN" room on TryHackMe is a Premium walkthrough that introduces users to the technologies and designs behind Local Area Networks (LANs). While the full content is behind a paywall and cannot be directly reproduced, I can guide you through the general structure and concepts typically covered in this room, based on standard networking knowledge and what TryHackMe usually includes in such modules.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🧩 Task 1: Introduction&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;LAN topologies refer to the layout or design of a network, and each type has its own strengths and weaknesses. The star topology is the most common today, where each device connects to a central hub or switch. It's reliable and scalable but more expensive due to the extra cabling and hardware. If the central device fails, the whole network is affected. The bus topology uses a single backbone cable to connect all devices, making it cheap and easy to set up. However, it's prone to bottlenecks and has a single point of failure, making troubleshooting difficult. The ring topology connects devices in a loop, requiring less cabling and hardware. It’s easier to troubleshoot but inefficient for data travel and vulnerable to total failure if any part of the loop breaks.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Switches are central devices that connect multiple devices efficiently by sending data only to the intended recipient, unlike hubs that broadcast to all. They are essential in larger networks. Routers, on the other hand, connect different networks and direct data between them using routing. Connecting switches and routers can improve network reliability by providing alternate data paths, even if it slightly reduces performance.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fs08poumn3b4d8rj8mwga.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fs08poumn3b4d8rj8mwga.png" alt="task 1 answers" width="800" height="356"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Now we need to complete the puzzle in the &lt;strong&gt;View Site&lt;/strong&gt; section in order to score the flag. It is a very self-teached way to achieve the flag while trying to compromise all topologies&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fg52hl697gbt531ysisif.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fg52hl697gbt531ysisif.png" alt="task 1 flag" width="766" height="757"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🧩 Task 2: A Primer on Subnetting&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;Subnetting is the process of dividing a larger network into smaller, more manageable segments called subnets. This is similar to slicing a cake so each department or group—like Accounting, Finance, or HR—gets its own portion. It helps networks efficiently route data to the correct destination, just as you'd send a document to the right department in an office.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Each subnet uses IP addresses in three key ways: to identify the network itself, to identify individual devices (hosts), and to designate a default gateway that connects to other networks. For example, in the IP range 192.168.1.0, the network address might be 192.168.1.0, a host could be 192.168.1.100, and the default gateway might be 192.168.1.254.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;While home networks typically use a single subnet due to fewer devices, businesses often require multiple subnets to handle a larger number of connected devices. Subnetting enhances efficiency, security, and control. For instance, a café might use subnetting to separate its internal systems (like cash registers) from the public Wi-Fi, ensuring both security and connectivity.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7s42azakwrhep2viq3x2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7s42azakwrhep2viq3x2.png" alt="task 2 answers" width="800" height="417"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🧩 Task 3: ARP&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;ARP (Address Resolution Protocol) is a network protocol that helps devices associate IP addresses with MAC addresses, allowing them to identify and communicate with each other on a local network. Each device maintains an ARP cache—a kind of internal ledger—that stores these associations.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;When a device wants to communicate with another, it sends an ARP request to the entire network asking, “Who has this IP address?” The device with that IP responds with its MAC address in an ARP reply. This information is then stored in the sender’s ARP cache for future use, streamlining communication and reducing the need for repeated broadcasts.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1d9028wrcfhyj8ig83rx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1d9028wrcfhyj8ig83rx.png" alt="task 3 answers" width="800" height="286"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🧩 Task 4: DHCP&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;IP addresses can be assigned to devices either manually or automatically. The most common method is automatic assignment using DHCP (Dynamic Host Configuration Protocol). When a device connects to a network and doesn't already have an IP address, it sends out a DHCP Discover message to locate a DHCP server. The server responds with a DHCP Offer, suggesting an available IP address. The device then replies with a DHCP Request, indicating it wants to use that address. Finally, the server confirms with a DHCP Acknowledgment (ACK), allowing the device to begin using the assigned IP. This process ensures efficient and dynamic IP management across networks.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7827e87xutlgqx2o8d7k.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7827e87xutlgqx2o8d7k.png" alt="task 4 answers" width="800" height="217"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🧾 Conclusion&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;The "Intro to LAN" room provides a foundational understanding of how local networks operate, which is essential for anyone pursuing cybersecurity, networking, or IT. By completing this room, you’ve gained:&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;A solid grasp of network topologies and how devices are structured in a LAN.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Knowledge of IP addressing and subnetting, crucial for managing and segmenting networks.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Insight into DHCP and DNS, which automate and simplify network communication.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;An understanding of MAC addresses and ARP, which enable devices to find each other on a LAN.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;This room sets the stage for more advanced topics like network scanning, penetration testing, and packet analysis. Mastering these basics ensures you're well-prepared for future challenges in both offensive and defensive cybersecurity roles.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>tryhackme</category>
      <category>network</category>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>TryHackMe: Security Engineer Intro – A Beginner's Walkthrough &amp; Lessons Learned</title>
      <dc:creator>Emanuele</dc:creator>
      <pubDate>Wed, 02 Jul 2025 14:28:38 +0000</pubDate>
      <link>https://dev.to/shadownet0110/tryhackme-security-engineer-intro-a-beginners-walkthrough-lessons-learned-2ecc</link>
      <guid>https://dev.to/shadownet0110/tryhackme-security-engineer-intro-a-beginners-walkthrough-lessons-learned-2ecc</guid>
      <description>&lt;p&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;The "Security Engineer Intro" room on TryHackMe is the first step in the Security Engineer learning path, designed to introduce learners to the responsibilities, tools, and mindset of a security engineer. Whether you're transitioning from another IT role or just starting out, this room offers a solid foundation.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Room Objectives&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Understand the role of a security engineer.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Learn about digital asset management.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Explore security operations and incident response.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Get introduced to SIEM tools and log analysis.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Understand the importance of documentation and compliance.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;🔹 Task 1: Introduction&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;This task sets the stage by explaining the importance of security engineers in protecting an organization's digital infrastructure. It emphasizes the proactive nature of the role—preventing breaches before they happen.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key Insight:&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;Security engineers are not just defenders; they are builders of secure systems.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🔹 Task 2: What is a Security Engineer&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;As organizations increasingly rely on digital technologies, they face growing threats like data breaches, ransomware, and cyberattacks. Abandoning technology isn't a viable option, so securing digital assets becomes essential—just like protecting physical ones. The goal is to ensure business continuity and protect critical operations from disruption.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Security engineers are hired to:&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Own and manage the organization's cybersecurity posture.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Minimize risks from cyber threats through strategic planning.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Design and implement secure systems and networks.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Conduct regular tests to identify and fix vulnerabilities.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Collaborate with other teams to enforce security protocols.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;They act as both builders and defenders, ensuring systems are secure by design and resilient in practice.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwhs6lsrb58d10sl0w7sx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwhs6lsrb58d10sl0w7sx.png" alt="answers task 2" width="800" height="90"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🔹 Task 3: Core Responsibilities of a Security Engineer&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;Security starts with knowing what you have. A security engineer must:&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Maintain an up-to-date inventory of digital assets.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Track details like asset type, IP address, location, network placement, running applications, access permissions, and ownership.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Ensure this inventory is regularly reviewed and updated.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;Security engineers help develop and enforce policies based on established principles. They:&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Create and implement organization-wide security policies.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Handle policy exceptions by evaluating business needs and suggesting risk mitigations.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Ensure compliance with both internal and external standards.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;Security engineers adopt a “secure by design” philosophy, which includes:&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Designing secure network architectures.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Hardening systems like Windows, Linux, and Active Directory.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Ensuring software development follows the Secure Software Development Lifecycle (SSDLC).&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;Security is an ongoing process. Engineers must:&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Plan and coordinate regular assessments, audits, and red/purple team exercises.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Work with external vendors by preparing RFQs (Request for Quotations).&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Prioritize and implement findings to continuously improve the security posture.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0pf5enplmh1alkr4k3ko.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0pf5enplmh1alkr4k3ko.png" alt="answers task 3" width="800" height="220"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🔹 Task 4: Continuous Improvement&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;An organization's security is an ongoing process, not a one-time task, and the role of a security engineer reflects this continuous journey of improvement. Their responsibilities go beyond just setting up policies—they must foster a culture of security awareness, especially to guard against human errors like social engineering. They also play a key role in risk management, helping leadership understand and mitigate potential threats, even when some risks must be accepted due to operational constraints. As organizations evolve, security engineers oversee change management to ensure new systems or updates don't introduce vulnerabilities. They also manage vulnerabilities by monitoring and patching systems based on threat severity. Lastly, they ensure compliance with relevant regulations and standards, working with auditors to maintain certifications and address any gaps.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd2109dmovxsehshr3m2c.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd2109dmovxsehshr3m2c.png" alt="answers task 4" width="800" height="158"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🔹 Task 5: Additional Roles and Responsibilities&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;The role of a security engineer is often broad and flexible, sometimes requiring them to support other teams beyond their core responsibilities. They may manage and fine-tune security tools like SIEMs, firewalls, and endpoint detection systems, and even advise on tool procurement based on organizational needs. They might also lead or participate in tabletop exercises, which simulate security incidents to test the organization's readiness and clarify team roles. Additionally, security engineers can be involved in disaster recovery and crisis management planning, helping ensure business continuity during emergencies, with their specific duties varying by organization.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzi1zuua1xn0bj7rpqoo4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzi1zuua1xn0bj7rpqoo4.png" alt="task 5 answers" width="800" height="164"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🔹 Task 6: Walking in Their Shoes&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;While performing their duties, security engineers must consider various aspects of running a business apart from keeping it secure. These considerations may include business operations, cost, ease of implementation, ease of use, and more. Although the most secure system is the one that is shut off and disconnected from power, such a system doesn't achieve any business objectives. Hence, a security engineer must consider business objectives and security when making decisions.&lt;/em&gt;&lt;br&gt;
Let's Launch the site to solve the little puzzle:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsxcz0iipk4n5wzq6hb4h.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsxcz0iipk4n5wzq6hb4h.png" alt="puzzle 6 task 1" width="705" height="739"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqwgrzv0rv4y9s2n2ezin.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqwgrzv0rv4y9s2n2ezin.png" alt="puzzle 6 task 2" width="702" height="775"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Those images are from the &lt;strong&gt;VAPT Report puzzle&lt;/strong&gt;&lt;/em&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F52kfexlbqbkivl3duygh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F52kfexlbqbkivl3duygh.png" alt="puzzle 6 task 3" width="700" height="759"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F21epz3kjgi6yunv4crc2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F21epz3kjgi6yunv4crc2.png" alt="puzzle 6 task 4" width="688" height="778"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7l90s49h0agdim9gkoi4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7l90s49h0agdim9gkoi4.png" alt="puzzle 6 task 5" width="681" height="748"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;We've got the flag!&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5y08a2bwfh9oavxqolbh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5y08a2bwfh9oavxqolbh.png" alt="room flag" width="762" height="769"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;✍️ Final Thoughts&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;The Security Engineer Intro room is a fantastic starting point for anyone curious about blue team roles. It’s not just about tools and alerts—it’s about building a secure culture within an organization.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>tryhackme</category>
      <category>infosec</category>
      <category>learning</category>
    </item>
    <item>
      <title>Mastering the Art of Online Investigation: TryHackMe's "Search Skills" Walkthrough</title>
      <dc:creator>Emanuele</dc:creator>
      <pubDate>Mon, 23 Jun 2025 16:11:08 +0000</pubDate>
      <link>https://dev.to/shadownet0110/mastering-the-art-of-online-investigation-tryhackmes-search-skills-walkthrough-4jdp</link>
      <guid>https://dev.to/shadownet0110/mastering-the-art-of-online-investigation-tryhackmes-search-skills-walkthrough-4jdp</guid>
      <description>&lt;p&gt;&lt;em&gt;In the world of cybersecurity, knowing how to search effectively is just as important as knowing how to code or exploit vulnerabilities. The "Search Skills" room on TryHackMe is a foundational module that teaches you how to navigate the vast ocean of online information using smart search techniques, specialized tools, and critical thinking.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;This post walks you through each task in the room, explaining the concepts and how to find the answers.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Task 1: Introduction&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;This task sets the stage by emphasizing the importance of search skills. You're asked to search for "learn hacking" on Google and observe the number of results.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;No answer required here, but it's a reminder of how overwhelming search results can be without proper filtering.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkm4mxam1yrffetra696x.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkm4mxam1yrffetra696x.png" alt="online search" width="800" height="121"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Task 2: Evaluation of Search Results&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Q2.1:&lt;/strong&gt; &lt;em&gt;What do you call a cryptographic method or product considered bogus or fraudulent?&lt;/em&gt;&lt;br&gt;
&lt;strong&gt;Answer:&lt;/strong&gt; &lt;em&gt;Snake Oil&lt;/em&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;In cybersecurity, "snake oil" refers to products that claim to offer security but are fundamentally flawed or deceptive.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Q2.2:&lt;/strong&gt; &lt;em&gt;What is the name of the command replacing &lt;code&gt;netstat&lt;/code&gt; in Linux systems?&lt;/em&gt;&lt;br&gt;
&lt;strong&gt;Answer:&lt;/strong&gt; &lt;em&gt;ss&lt;/em&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;ss (Socket Statistics) is faster and more informative than netstat.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fucijt8svurrwpc3cp0su.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fucijt8svurrwpc3cp0su.png" alt="answ section 2" width="800" height="153"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Task 3: Search Engines&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Q3.1:&lt;/strong&gt; &lt;em&gt;How would you limit your Google search to PDF files containing the terms cyber warfare report?&lt;/em&gt;&lt;br&gt;
&lt;strong&gt;Answer:&lt;/strong&gt; &lt;em&gt;filetype:pdf cyber warfare report&lt;/em&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;Use filetype: to filter by document type.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Q3.2:&lt;/strong&gt; &lt;em&gt;What phrase does the Linux command ss stand for?&lt;/em&gt;&lt;br&gt;
&lt;strong&gt;Answer:&lt;/strong&gt; &lt;em&gt;Socket Statistics&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkakbhnrzvcdbrljegr3t.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkakbhnrzvcdbrljegr3t.png" alt="Section 3" width="800" height="147"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Task 4: Specialized Search Engines&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Q4.1:&lt;/strong&gt; &lt;em&gt;What is the top country with &lt;code&gt;lighttpd&lt;/code&gt; servers?&lt;/em&gt;&lt;br&gt;
&lt;strong&gt;Answer:&lt;/strong&gt; &lt;em&gt;United States&lt;/em&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;Use Shodan to search for lighttpd and filter by country.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Q4.2:&lt;/strong&gt; &lt;em&gt;What does BitDefenderFalx detect the file with the given hash as?&lt;/em&gt;&lt;br&gt;
&lt;strong&gt;Answer:&lt;/strong&gt; &lt;em&gt;Android.Riskware.Agent.LHH&lt;/em&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;Use VirusTotal to analyze the hash.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fafv7y65x0wjvdsj791hr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fafv7y65x0wjvdsj791hr.png" alt="Section 4" width="800" height="151"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Task 5: Vulnerabilities and Exploits&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Q5.1:&lt;/strong&gt; &lt;em&gt;What utility does CVE-2024-3094 refer to?&lt;/em&gt;&lt;br&gt;
&lt;strong&gt;Answer:&lt;/strong&gt; &lt;em&gt;xz&lt;/em&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;Search the CVE ID on cve.mitre.org or NVD.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flgmqrzaatpr32hhk2tg0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flgmqrzaatpr32hhk2tg0.png" alt="section 5" width="800" height="89"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Task 6: Technical Documentation&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Q6.1:&lt;/strong&gt; &lt;em&gt;What does the Linux command cat do?&lt;/em&gt;&lt;br&gt;
&lt;strong&gt;Answer:&lt;/strong&gt; &lt;em&gt;&lt;strong&gt;Concatenate&lt;/strong&gt; and display file content&lt;/em&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;Use &lt;code&gt;man cat&lt;/code&gt; in a Linux terminal or search online for the manual page.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Q6.2:&lt;/strong&gt; &lt;em&gt;What parameter in Windows netstat shows the executable involved?&lt;/em&gt;&lt;br&gt;
&lt;strong&gt;Answer:&lt;/strong&gt; &lt;em&gt;-b&lt;/em&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;Use netstat -b in Command Prompt (admin mode).&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5h0ykei6a647obgw2j5j.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5h0ykei6a647obgw2j5j.png" alt="section 6" width="800" height="160"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Task 7: Social Media&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Q7.1:&lt;/strong&gt; &lt;em&gt;What platform is useful for learning about a company’s technical staff?&lt;/em&gt;&lt;br&gt;
&lt;strong&gt;Answer:&lt;/strong&gt; &lt;em&gt;LinkedIn&lt;/em&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;OSINT investigators often use LinkedIn to gather professional info.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Q7.2:&lt;/strong&gt; &lt;em&gt;What platform might help find answers to secret questions?&lt;/em&gt;&lt;br&gt;
&lt;strong&gt;Answer:&lt;/strong&gt; &lt;em&gt;Facebook&lt;/em&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;People often share personal details that can be used in social engineering.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Few3hadbynjlsnk8ihtuc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Few3hadbynjlsnk8ihtuc.png" alt="section 7" width="800" height="169"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Task 8: Conclusion&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;This task wraps up the room and encourages you to apply these skills in real-world scenarios. The ability to search smartly is a superpower in cybersecurity.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🧠 Final Thoughts&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;The "Search Skills" room is a must-do for anyone starting in cybersecurity. It teaches you how to:&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Evaluate sources critically&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Use advanced search operators&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Leverage specialized tools like Shodan and VirusTotal&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Navigate technical documentation&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Perform OSINT using social media&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>cybersecurity</category>
      <category>learning</category>
      <category>osint</category>
      <category>tryhackme</category>
    </item>
    <item>
      <title>Lessons Learned: Getting Started with Blue Teaming via TryHackMe's "Defensive Security Intro"</title>
      <dc:creator>Emanuele</dc:creator>
      <pubDate>Fri, 20 Jun 2025 14:41:16 +0000</pubDate>
      <link>https://dev.to/shadownet0110/lessons-learned-getting-started-with-blue-teaming-via-tryhackmes-defensive-security-intro-490h</link>
      <guid>https://dev.to/shadownet0110/lessons-learned-getting-started-with-blue-teaming-via-tryhackmes-defensive-security-intro-490h</guid>
      <description>&lt;p&gt;&lt;em&gt;As I continue my journey into cybersecurity, I recently explored the Defensive Security Intro room on TryHackMe. While offensive security often gets the spotlight, this room reminded me of the critical importance of defensive strategies—the unsung heroes of cyber resilience.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Here’s a walkthrough of the room and the key lessons I learned.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🧭 Room Overview&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;The Defensive Security Intro room is a beginner-friendly, theory-based module that introduces the core concepts of blue teaming—the practice of defending systems from cyber threats. It’s perfect for anyone curious about how organizations detect, respond to, and recover from attacks.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🔐 Walkthrough &amp;amp; Key Concepts&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;🧱 Task 1: What is Defensive Security?&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;This task lays the foundation by explaining the CIA Triad—Confidentiality, Integrity, and Availability. These three principles guide all defensive strategies.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🧠 Lesson:&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;Defensive security is proactive and reactive.&lt;br&gt;
It’s not just about firewalls—it's about monitoring, detection, and response.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🧰 Task 2: Tools of the Trade&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;This section introduces essential tools used by blue teams:&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;SIEM (Security Information and Event Management):&lt;/strong&gt; &lt;em&gt;Tools like Splunk and ELK stack help collect and analyze logs.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;EDR (Endpoint Detection and Response):&lt;/strong&gt; &lt;em&gt;Tools like CrowdStrike and SentinelOne monitor endpoints for suspicious behavior.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Firewalls &amp;amp; IDS/IPS:&lt;/strong&gt; &lt;em&gt;Network-level defenses that filter traffic and detect intrusions.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;🧠 Lesson:&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;Logs are gold. Understanding how to read and correlate logs is a vital skill.&lt;br&gt;
Automation is key—manual monitoring doesn’t scale.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🧪 Task 3: Incident Response Lifecycle&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;This task walks through the six phases of incident response:&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Preparation&lt;/strong&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Identification&lt;/strong&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Containment&lt;/strong&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Eradication&lt;/strong&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Recovery&lt;/strong&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Lessons Learned&lt;/strong&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;🧠 Lesson:&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;Incident response is a team sport—communication and documentation are just as important as technical skills.&lt;br&gt;
The “Lessons Learned” phase is often overlooked but critical for improving defenses.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🧠 Practical Example: SIEM Simulator&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;We have a practical SIEM dashboard with logs from account access, our task is to spot the unauthorized access ip and proceed to block it in order to get the room flag. All the process is fully guided, well explained and quite similar to what really happen in Splunk.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxode0h73sjw1v7i7smk3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxode0h73sjw1v7i7smk3.png" alt="ip to block" width="738" height="453"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhvs2ztw7hyco735ubv60.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhvs2ztw7hyco735ubv60.png" alt="room flag" width="760" height="424"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;📚 Key Takeaways&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Defense is Deep:&lt;/strong&gt; &lt;em&gt;It’s not just about stopping attacks—it’s about understanding them, detecting them early, and responding effectively.&lt;/em&gt;&lt;br&gt;
&lt;strong&gt;Tools are Powerful, but Context is King:&lt;/strong&gt; &lt;em&gt;Knowing how to interpret alerts and logs is more important than just knowing how to use a tool.&lt;/em&gt;&lt;br&gt;
&lt;strong&gt;Incident Response is a Lifecycle:&lt;/strong&gt; &lt;em&gt;It’s not a one-time event. Continuous improvement is essential.&lt;/em&gt;&lt;br&gt;
&lt;strong&gt;Threat Intelligence is a Force Multiplier:&lt;/strong&gt; &lt;em&gt;It turns raw data into actionable insights.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🚀 Final Thoughts&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;The Defensive Security Intro room is a fantastic starting point for anyone interested in blue teaming. It’s less hands-on than offensive rooms, but it lays the groundwork for understanding how real-world organizations defend against cyber threats.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>learning</category>
      <category>tryhackme</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Lessons Learned: My First Ethical Hack with TryHackMe's "Offensive Security Intro"</title>
      <dc:creator>Emanuele</dc:creator>
      <pubDate>Fri, 20 Jun 2025 14:24:17 +0000</pubDate>
      <link>https://dev.to/shadownet0110/lessons-learned-my-first-ethical-hack-with-tryhackmes-offensive-security-intro-1ap7</link>
      <guid>https://dev.to/shadownet0110/lessons-learned-my-first-ethical-hack-with-tryhackmes-offensive-security-intro-1ap7</guid>
      <description>&lt;p&gt;&lt;em&gt;As someone diving into the world of cybersecurity, I recently completed the Offensive Security Intro room on TryHackMe—and it was a game-changer. This room is designed for absolute beginners and offers a hands-on introduction to ethical hacking in a safe, legal environment. Here's a walkthrough of my experience and the key lessons I took away.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🧭 Room Overview&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;The Offensive Security Intro room is a 15-minute beginner-friendly lab that simulates a real-world hacking scenario. The goal? Hack into a fake banking website called FakeBank using basic tools and techniques that ethical hackers use daily.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🛠️ Walkthrough &amp;amp; Key Concepts&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;🔍 Task 1: What is Offensive Security?&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;The room kicks off with a simple but powerful idea:&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;“To outsmart a hacker, you need to think like one.”&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Offensive Security is all about simulating attacks to find vulnerabilities before malicious actors do. This task introduces the concept of penetration testing and sets the stage for the hands-on part.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;💻 Task 2: Hacking Your First Machine&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;Here’s where the fun begins. TryHackMe spins up a virtual machine running the &lt;strong&gt;FakeBank&lt;/strong&gt; website. The goal is to find hidden pages using a tool called &lt;strong&gt;Gobuster&lt;/strong&gt;.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🧪 Step-by-Step:&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;Start the Machine: Launch the VM and open the terminal.&lt;/em&gt;&lt;br&gt;
&lt;em&gt;Run Gobuster:&lt;/em&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;gobuster -u http://fakebank.thm -w wordlist.txt dir
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F98p439gjwc8hscmbqjn3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F98p439gjwc8hscmbqjn3.png" alt="gobuster" width="800" height="344"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;This brute-forces the website to find hidden directories.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Find the Admin Page: One of the discovered paths is /admin, which leads to a login portal.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwtarkuzxo0cnrpygpttr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwtarkuzxo0cnrpygpttr.png" alt="admin" width="800" height="355"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🔐 Task 3: Force a bank transfer&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;Once inside the /admin staff page, the next step is to force a bank transfer from another account to our 8881 account. After the confirmation we need to come back to our dashboard to discover the room flag.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F731pvb0a37xw7k8sv6pm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F731pvb0a37xw7k8sv6pm.png" alt="room flag" width="800" height="343"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🧠 Lesson:&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;This simulates the real-world impact of a successful attack.&lt;br&gt;
It reinforces the importance of securing backend admin portals.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;📚 Key Takeaways&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;Hands-On Learning is Powerful: Reading about hacking is one thing—doing it is another. This room made abstract concepts tangible.&lt;br&gt;
Tools Matter: Gobuster is a simple yet powerful tool for directory brute-forcing.&lt;br&gt;
Think Like an Attacker: Understanding how attackers operate helps you build better defenses.&lt;br&gt;
Security is Layered: From weak credentials to exposed admin panels, every layer matters.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🚀 Final Thoughts&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;If you're new to cybersecurity, I highly recommend starting with this TryHackMe room. It’s short, practical, and gives you a real taste of what ethical hacking is all about.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>tryhackme</category>
      <category>learning</category>
    </item>
    <item>
      <title>Exploring Cybersecurity Roles: A Walkthrough of TryHackMe's "Careers in Cyber" Room</title>
      <dc:creator>Emanuele</dc:creator>
      <pubDate>Wed, 18 Jun 2025 14:19:22 +0000</pubDate>
      <link>https://dev.to/shadownet0110/exploring-cybersecurity-roles-a-walkthrough-of-tryhackmes-careers-in-cyber-room-ie5</link>
      <guid>https://dev.to/shadownet0110/exploring-cybersecurity-roles-a-walkthrough-of-tryhackmes-careers-in-cyber-room-ie5</guid>
      <description>&lt;p&gt;&lt;em&gt;As someone diving deeper into the world of cybersecurity, I recently completed the Careers in Cyber room on TryHackMe. This room isn’t a traditional CTF or hands-on hacking challenge—instead, it’s a career exploration module designed to help you understand the various roles in the cybersecurity industry.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Here’s a breakdown of what I learned, my personal takeaways, and why I think every aspiring cyber professional should go through this room.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🧭 Room Overview&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;The Careers in Cyber room is structured into several tasks, each focusing on a specific cybersecurity role. It’s beginner-friendly and takes about 30–45 minutes to complete. You don’t need any technical setup—just a browser and curiosity.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🧠 Key Roles Covered&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;1. Security Analyst&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6qtb5po000a1vo5enfuo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6qtb5po000a1vo5enfuo.png" alt="sec analyst" width="349" height="361"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What they do:&lt;/strong&gt; &lt;em&gt;Monitor networks, analyze threats, and respond to incidents.&lt;/em&gt;&lt;br&gt;
&lt;strong&gt;Skills needed:&lt;/strong&gt; &lt;em&gt;SIEM tools, log analysis, basic scripting, communication.&lt;/em&gt;&lt;br&gt;
&lt;strong&gt;Learning path:&lt;/strong&gt; &lt;em&gt;TryHackMe’s Pre-Security and SOC Level 1 paths are great starting points.&lt;/em&gt;&lt;br&gt;
&lt;em&gt;💡 Personal Insight: This role feels like the “first responder” of cyber. It’s ideal for those who enjoy puzzles and real-time problem-solving.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Security Engineer&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fidbnixajs8l9osaaift7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fidbnixajs8l9osaaift7.png" alt="sec eng" width="525" height="358"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What they do:&lt;/strong&gt; &lt;em&gt;Build and maintain secure systems, implement firewalls, and harden infrastructure.&lt;/em&gt;&lt;br&gt;
&lt;strong&gt;Skills needed:&lt;/strong&gt; &lt;em&gt;Networking, system administration, scripting, cloud security.&lt;/em&gt;&lt;br&gt;
&lt;strong&gt;Learning path:&lt;/strong&gt; &lt;em&gt;Cyber Defense and Red Teaming paths on TryHackMe.&lt;/em&gt;&lt;br&gt;
&lt;em&gt;💡 Personal Insight: This role appeals to builders—those who want to proactively design secure environments rather than just react to threats.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Incident Responder&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3yn0xkzgc4a7ft5n7xge.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3yn0xkzgc4a7ft5n7xge.png" alt="responder" width="421" height="358"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What they do:&lt;/strong&gt; &lt;em&gt;Investigate breaches, contain threats, and perform forensics.&lt;/em&gt;&lt;br&gt;
&lt;strong&gt;Skills needed:&lt;/strong&gt; &lt;em&gt;Digital forensics, malware analysis, threat intelligence.&lt;/em&gt;&lt;br&gt;
&lt;strong&gt;Learning path:&lt;/strong&gt; &lt;em&gt;SOC Level 1 and Threat Hunting modules.&lt;/em&gt;&lt;br&gt;
&lt;em&gt;💡 Personal Insight: This is the cyber equivalent of a detective. If you love digging into logs and uncovering what went wrong, this might be your path.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Penetration Tester&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp66bxmdngu9c3g787m8q.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp66bxmdngu9c3g787m8q.png" alt="pentester" width="355" height="339"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What they do:&lt;/strong&gt; &lt;em&gt;Simulate attacks to find vulnerabilities before real attackers do.&lt;/em&gt;&lt;br&gt;
&lt;strong&gt;Skills needed:&lt;/strong&gt; &lt;em&gt;Kali Linux, Metasploit, Burp Suite, scripting, report writing.&lt;/em&gt;&lt;br&gt;
&lt;strong&gt;Learning path:&lt;/strong&gt; &lt;em&gt;Offensive Pentesting and Complete Beginner paths.&lt;/em&gt;&lt;br&gt;
&lt;em&gt;💡 Personal Insight: This is the most “Hollywood” role—fun, technical, and high-impact. But it also requires strong ethics and communication skills.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5. Governance, Risk, and Compliance (GRC)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnbg6seqag11jirsclc0r.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnbg6seqag11jirsclc0r.png" alt="forensics" width="358" height="300"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What they do:&lt;/strong&gt; &lt;em&gt;Ensure organizations meet security standards and regulations.&lt;/em&gt;&lt;br&gt;
&lt;strong&gt;Skills needed:&lt;/strong&gt; &lt;em&gt;Policy writing, risk assessment, frameworks like ISO 27001, NIST.&lt;/em&gt;&lt;br&gt;
&lt;strong&gt;Learning path:&lt;/strong&gt; &lt;em&gt;While not deeply technical, understanding security fundamentals is key.&lt;/em&gt;&lt;br&gt;
&lt;em&gt;💡 Personal Insight: GRC is often overlooked but is critical for aligning security with business goals. It’s perfect for those with a strategic mindset.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🧭 Lessons Learned&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;&lt;strong&gt;Cybersecurity is broad:&lt;/strong&gt; There’s a role for every personality type—whether you’re technical, analytical, or strategic.&lt;br&gt;
&lt;strong&gt;Soft skills matter:&lt;/strong&gt; Communication, documentation, and collaboration are just as important as technical prowess.&lt;br&gt;
&lt;strong&gt;Start with curiosity:&lt;/strong&gt; You don’t need to know everything. Pick a path that excites you and build from there.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🧰 My Next Steps&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;After completing this room, I’ve decided to focus more on the Security Analyst path. I’m currently working through TryHackMe’s PT1 and SOC Level 1 learning path and brushing up on my log analysis and scripting skills.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🎯 Final Thoughts&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;The Careers in Cyber room is a fantastic starting point for anyone unsure about where they fit in the cybersecurity landscape. It’s informative, well-structured, and gives you a clear roadmap for your next steps.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;If you’re just starting out or even considering a career switch, I highly recommend giving this room a try. It might just help you find your place in the cyber world.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>career</category>
      <category>tryhackme</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Solving TryHackMe's "Lo-Fi" Room - A Complete Walkthrough</title>
      <dc:creator>Emanuele</dc:creator>
      <pubDate>Wed, 18 Jun 2025 14:02:27 +0000</pubDate>
      <link>https://dev.to/shadownet0110/solving-tryhackmes-lo-fi-room-a-complete-walkthrough-4ldp</link>
      <guid>https://dev.to/shadownet0110/solving-tryhackmes-lo-fi-room-a-complete-walkthrough-4ldp</guid>
      <description>&lt;p&gt;&lt;strong&gt;🧭 Introduction&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;In this post, I’ll walk you through my experience solving the Lo-Fi game on TryHackMe. This room is part of the Challenge section, which is perfect for beginners looking to understand how LFI Path Traversal works and how attackers can exploit web application weaknesses thru file inclusion.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🧩 Room Breakdown&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;Let's start our journey by visiting the IP shown in the challenge section. We will discover a sort of a blog application running on this ip. We are tasked to pay attention to the &lt;strong&gt;URL&lt;/strong&gt; bar and how the &lt;strong&gt;URL string&lt;/strong&gt; change while visiting the links provided next to the video.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk7a6sn0qz5y7n6zp6lwz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk7a6sn0qz5y7n6zp6lwz.png" alt="first look" width="800" height="367"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Let's visit the first link called &lt;strong&gt;Relax&lt;/strong&gt; and wait until the URL gets modified&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdwhfsir662spym90x5td.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdwhfsir662spym90x5td.png" alt="url change" width="800" height="339"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;The URL parameter suggests us that the site is using &lt;strong&gt;PHP file inclusion&lt;/strong&gt;. This can be vulnerable and can lead to &lt;strong&gt;Local File Inclusion (LFI)&lt;/strong&gt; if the input is not properly sanitized. We can get access to:&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;/etc/passwd:&lt;/strong&gt; &lt;em&gt;Contains user account info (usernames, UID, home directory, shell). Passwords used to be stored here but now are in:&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;/etc/shadow:&lt;/strong&gt; &lt;em&gt;Contains hashed passwords, readable only by root.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;Let's craft a valid url to land to the &lt;code&gt;passwd&lt;/code&gt; file.&lt;/em&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;http://10.10.136.146/page?=../etc/passwd
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu4nnsn75zqfeguqrwrh3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu4nnsn75zqfeguqrwrh3.png" alt="no luck" width="800" height="384"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmxgf05k17wb0gk0a0q9t.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmxgf05k17wb0gk0a0q9t.png" alt="no luck 2" width="800" height="419"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;HELP TIPS: It may require from two to five times the pattern "/../" before the /etc/passwd in order to match the exact location.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyf9ed5hsid049v715v82.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyf9ed5hsid049v715v82.png" alt="password location" width="800" height="388"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Great, we score the first file, now same path, but let's look for the &lt;strong&gt;shadow&lt;/strong&gt; file. I'll expect that we'll get a blank result, it will tell that we're not the root on this system.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fo5u3f01j10wb3rs1z0li.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fo5u3f01j10wb3rs1z0li.png" alt="blank results" width="800" height="346"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;No Admin here, ok, we cannot access this system. Let's dig for the flag, assuming that the file will be named &lt;code&gt;flag.txt&lt;/code&gt;.&lt;/em&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;http://10.10.136.146/page?=../../../flag.txt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkh3o1mxtm1shuvm91w7j.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkh3o1mxtm1shuvm91w7j.png" alt="flag" width="800" height="379"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Good, we've managed to get the flag at first try!&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;📌 Final Thoughts&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;The Lo-Fi room is a great exercise in chaining basic enumeration with web exploitation and privilege escalation. Perfect for sharpening your CTF skills.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>challenge</category>
      <category>tryhackme</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Solving TryHackMe's "Net Sec Challenge" Room - A Complete Walkthrough</title>
      <dc:creator>Emanuele</dc:creator>
      <pubDate>Wed, 18 Jun 2025 12:47:26 +0000</pubDate>
      <link>https://dev.to/shadownet0110/solving-tryhackmes-net-sec-challenge-room-a-complete-walkthrough-95j</link>
      <guid>https://dev.to/shadownet0110/solving-tryhackmes-net-sec-challenge-room-a-complete-walkthrough-95j</guid>
      <description>&lt;p&gt;&lt;strong&gt;🧭 Introduction&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;In this post, I’ll walk you through my experience solving the Network Security room on TryHackMe. This room is part of the Network Security module, which is perfect for beginners looking to understand how computers communicate and how attackers can exploit network weaknesses.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🧰 Tools Used&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;Nmap – for scanning and enumeration&lt;br&gt;
Hydra – for cracking ftp credentials&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🧩 Room Breakdown&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;We will prepare our one line nmap command that will answer to all of our initial questions, i'll share what i've found out that is an easy win here:&lt;/em&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;nmap -sC -sV -p- -T4 &amp;lt;MACHINE_IP&amp;gt; -vv
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvxwhc29o7a60dt4s9ys0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvxwhc29o7a60dt4s9ys0.png" alt="nmap" width="800" height="539"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi2sklg23xn8lu0kt55l1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi2sklg23xn8lu0kt55l1.png" alt="nmap 1" width="800" height="531"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5vgzdjonu708eoj3p3rh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5vgzdjonu708eoj3p3rh.png" alt="nmap flag" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Now let's answer to this group of questions, like i did in the following:&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkij9hssn9verfpv4fha8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkij9hssn9verfpv4fha8.png" alt="answers 1" width="800" height="493"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;We've also got the FTP server version, which is the &lt;strong&gt;vsftpd 3.0.5&lt;/strong&gt;, forgot to include the screenshot :/&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;For the upcoming task we have to use &lt;strong&gt;Hydra&lt;/strong&gt; since we didn't got any password to SSH into those user account, we have to give Hydra &lt;code&gt;rockyou.txt&lt;/code&gt; wordlist in order to crack a password. I'll move the two usernames into a file called &lt;code&gt;users.txt&lt;/code&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6h45s2wd0fnc45p7xcd1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6h45s2wd0fnc45p7xcd1.png" alt="nano usernames" width="800" height="528"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;A little check before building the Hydra command:&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgpuog8lhbm5ij3m3xrhq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgpuog8lhbm5ij3m3xrhq.png" alt="a little check" width="800" height="529"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Ok so now we need to build our Hydra command for cracking two passwords while running, this probably is not the best practice out there but worked fine for me:&lt;/em&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;hydra -t 8 -L users.txt -P /usr/share/wordlists/rockyou.txt ftp:10.10.101.15:10021
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;em&gt;Let it run and let's wait patiently until gives us some results!&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fv89yfn3rp62ojwn4soff.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fv89yfn3rp62ojwn4soff.png" alt="crack hydra" width="589" height="261"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Clear up the terminal, we're going to connect now to the ftp location using our first found credentials &lt;strong&gt;eddie - jordan&lt;/strong&gt;. Using the code snippet here, you are task to locate a txt file with the flag, &lt;code&gt;ls -la&lt;/code&gt; will help us since we cannot use any command like &lt;code&gt;locate&lt;/code&gt; or &lt;code&gt;find&lt;/code&gt; in a ftp connection.&lt;/em&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;ftp &amp;lt;MACHINE_IP&amp;gt; 10021
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0xj2q1hd3hanecqcq8c9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0xj2q1hd3hanecqcq8c9.png" alt="eddie login" width="727" height="472"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;No luck with &lt;strong&gt;eddie&lt;/strong&gt;, we will try again with &lt;strong&gt;quinn - andrea&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzfr6s7eaox86atuyib2e.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzfr6s7eaox86atuyib2e.png" alt="quinn login" width="727" height="472"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;From this point we can input &lt;code&gt;get ftp_flag.txt&lt;/code&gt; and save the flag file into our AttackBox. Let's &lt;code&gt;cat&lt;/code&gt; this file and our flag is shown:&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frkbi6xly4mqioxg1433c.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frkbi6xly4mqioxg1433c.png" alt="ftp flag" width="727" height="481"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Last but not least the ip to visit with a little challenge to score. First let's have a look.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhxmfu5jxtrju9z5rojp6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhxmfu5jxtrju9z5rojp6.png" alt="web challenge" width="800" height="656"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;It looks like we have to go undercover to trick the web application to give us a flag. We're try to solve this with &lt;strong&gt;Nmap&lt;/strong&gt; null scan.&lt;/em&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;nmap -sN 10.10.101.15
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0a3plc2fotis1n873pg3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0a3plc2fotis1n873pg3.png" alt="last answer" width="800" height="713"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;We've managed to solve the entire room, get this last flag to answer the last question!&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;📌 Final Thoughts&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;The Network Security room is a fantastic starting point for anyone diving into cybersecurity. It’s hands-on, practical, and builds a solid foundation for more advanced topics.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;If you’re just starting out, I highly recommend giving this room a try. Feel free to drop your questions or share your own experiences in the comments!&lt;/em&gt;&lt;/p&gt;

</description>
      <category>challenge</category>
      <category>infosec</category>
      <category>tryhackme</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Solving TryHackMe's "Vulnerability Capstone" Room - A Complete Walkthrough</title>
      <dc:creator>Emanuele</dc:creator>
      <pubDate>Fri, 13 Jun 2025 16:21:01 +0000</pubDate>
      <link>https://dev.to/shadownet0110/solving-tryhackmes-vulnerability-capstone-room-a-complete-walkthrough-59op</link>
      <guid>https://dev.to/shadownet0110/solving-tryhackmes-vulnerability-capstone-room-a-complete-walkthrough-59op</guid>
      <description>&lt;p&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;In this post, I’ll walk you through my experience solving the Vulnerability Capstone room on TryHackMe. This room is the final challenge in the Vulnerability Research module and is designed to test your ability to identify, research, and exploit real-world vulnerabilities.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 1: Initial Reconnaissance&lt;/strong&gt;&lt;br&gt;
Before diving into exploitation, we need to gather information about the target system. Start the Machine first and then your AttackBox. We'll be using a tool called &lt;strong&gt;nmap&lt;/strong&gt;. After everything is correctly loaded, let's jump into the Kali terminal and let's start scanning the target machine that has ip &lt;code&gt;10.10.56.68&lt;/code&gt;, i used the following code:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;nmap -sV -sC -T4 10.10.56.68 -vv
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4xydpyqsyoamz68xohc8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4xydpyqsyoamz68xohc8.png" alt="nmap scan" width="800" height="529"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;When scrolling the terminal down a bit we've found out the juicy informations we were looking for at first try.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzdxchnewso2gs6sftfbn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzdxchnewso2gs6sftfbn.png" alt="nmap scan 2" width="800" height="519"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Now we can answer the first group of questions that we have.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp5md7c8kadgcsk4bu6ev.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp5md7c8kadgcsk4bu6ev.png" alt="quest 1" width="800" height="313"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;For the other part of this task i'll switch to a tool called &lt;strong&gt;GOOGLE&lt;/strong&gt;, it's free, you can actually invoke it in your web browser ;) and look if &lt;strong&gt;Fuel CMS&lt;/strong&gt; has some CVE exposed.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu0jcm8koqlejgxw7koh4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu0jcm8koqlejgxw7koh4.png" alt="mitre vulns" width="800" height="254"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;This is our next answer in the list, now let's focus on our final task which is the flag capturing.&lt;/em&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;QUICK TIPS! You are in your browser, why don't you visit the 10.10.56.68?!&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;em&gt;That's right, but one more thing to say, on nmap we noticed a txt file hiding, visiting the path in the browser will reveal another web location to look.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fx2zwbwwhm0c35c02istg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fx2zwbwwhm0c35c02istg.png" alt="txt file" width="800" height="366"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Let's visit the path &lt;strong&gt;fuel&lt;/strong&gt; then.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsv4zyf50y9uaamrbrh5t.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsv4zyf50y9uaamrbrh5t.png" alt="login form" width="800" height="339"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;A login form, interesting, I've investigated the source code but no details we're found about a potential username. We have to exploit manually via the CVE we've discovered previously. After doing some searches, we have to copy and paste this exploit here into a file that we want to create:&lt;/em&gt; &lt;a href="https://gist.github.com/anir0y/8529960c18e212948b0e40ed1fb18d6d#file-fuel-cms-py" rel="noopener noreferrer"&gt;https://gist.github.com/anir0y/8529960c18e212948b0e40ed1fb18d6d#file-fuel-cms-py&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;&lt;em&gt;Let's &lt;strong&gt;nano&lt;/strong&gt; that into a file with python extension&lt;/em&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;nano exploit.py
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhax3fl5zubb6htd3mxql.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhax3fl5zubb6htd3mxql.png" alt="exploit pasted" width="800" height="531"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Save and let it run via python3 command:&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff6qkdfr0t5k8as8q0ue8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff6qkdfr0t5k8as8q0ue8.png" alt="command" width="800" height="523"&gt;&lt;/a&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;python3 exploit.py 10.10.56.68
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmmed5hggsg6ljho6u7w2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmmed5hggsg6ljho6u7w2.png" alt="exploit run" width="800" height="507"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Ok, we need to set up, in another terminal window, a &lt;strong&gt;NetCat&lt;/strong&gt; session ready to get the reverse shell from the Fuel CMS, like so.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fh7xaiuweeudsjnh4tptb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fh7xaiuweeudsjnh4tptb.png" alt="netcat session" width="800" height="524"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Back to the exploit window terminal, let's input &lt;code&gt;shell_me&lt;/code&gt; and let's give &lt;code&gt;ATTACKBOX_IP:4444&lt;/code&gt; as attacker ip+port to listen.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5faha5y4k76ioo5fdw0i.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5faha5y4k76ioo5fdw0i.png" alt="exploit successfull" width="800" height="334"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;After receiving the reverse shell to the application, it's an easy win to score the flag, since the path is in the question! &lt;strong&gt;THM{ACKME_BLOG_HACKED}&lt;/strong&gt; is our final answer and that's all folks!&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fabl7ljmvsdsm1tg0nwxl.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fabl7ljmvsdsm1tg0nwxl.png" alt="flag" width="800" height="529"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;💡 Final Thoughts:&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;The "Vulnerability Capstone" room was more than just a challenge—it was a mini red-team engagement that tested my technical skills and problem-solving mindset. If you're looking to solidify your pentesting fundamentals, this room is a must-try.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>challenge</category>
      <category>infosec</category>
      <category>tryhackme</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>TryHackMe: Race Conditions – A Deep Dive into a Subtle Yet Powerful Exploit</title>
      <dc:creator>Emanuele</dc:creator>
      <pubDate>Tue, 10 Jun 2025 17:49:56 +0000</pubDate>
      <link>https://dev.to/shadownet0110/tryhackme-race-conditions-a-deep-dive-into-a-subtle-yet-powerful-exploit-2c1</link>
      <guid>https://dev.to/shadownet0110/tryhackme-race-conditions-a-deep-dive-into-a-subtle-yet-powerful-exploit-2c1</guid>
      <description>&lt;p&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;Race conditions are one of those vulnerabilities that are often overlooked but can have devastating consequences when exploited correctly. In this TryHackMe room, we explore how attackers can manipulate the timing of operations to gain unauthorized access or perform unintended actions.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;This guide walks you through the room step-by-step, explains the underlying concepts, and shares some personal thoughts on why this vulnerability is both fascinating and dangerous.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What is a Race Condition?&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;A race condition occurs when a system's behavior depends on the sequence or timing of uncontrollable events. In web applications, this often means two or more processes accessing shared resources (like a database or file) simultaneously, leading to unexpected behavior.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Real-World Analogy&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;Imagine two people trying to withdraw money from the same bank account at the exact same time. If the system doesn't lock the account during the transaction, both might end up withdrawing more than the available balance. That’s a race condition.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🛠️ Room Walkthrough&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Multi-Threading Section&lt;/strong&gt;&lt;/em&gt;&lt;br&gt;
&lt;em&gt;Here are the vital concepts that we have to understand:&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;A &lt;strong&gt;program&lt;/strong&gt; is a set of instructions to achieve a specific task. You need to execute the program to accomplish what you want. Unless you execute it, it won’t do anything and remains a set of static instructions.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;A &lt;strong&gt;process&lt;/strong&gt; is a program in execution. In some literature, you might come across the term job. Both terms refer to the same thing, although the term process has superseded the term job. Unlike a program, which is static, a process is a dynamic entity. It holds several key aspects, in particular:&lt;/em&gt;&lt;br&gt;
&lt;em&gt;&lt;strong&gt;Program:&lt;/strong&gt; The executable code related to the process&lt;br&gt;
&lt;strong&gt;Memory:&lt;/strong&gt; Temporary data storage&lt;br&gt;
&lt;strong&gt;State:&lt;/strong&gt; A process usually hops between different states. After it is in the New state, i.e., just created, it moves to the Ready state, i.e., ready to run once given CPU time. Once the CPU allocates time for it, it goes to the Running state. Furthermore, it can be in the Waiting state pending I/O or event completion. Once it exits, it moves to the Terminated state.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;A &lt;strong&gt;thread&lt;/strong&gt; is a lightweight unit of execution. It shares various memory parts and instructions with the process.&lt;br&gt;
In many cases, we need to replicate the same process repeatedly. Think of a web server serving thousands of users the same page (or a personalized page). We can adopt one of two main approaches:&lt;br&gt;
&lt;strong&gt;Serial:&lt;/strong&gt; One process is running; it serves one user after the other sequentially. New users are enqueued.&lt;br&gt;
&lt;strong&gt;Parallel:&lt;/strong&gt; One process is running; it creates a thread to serve every new user. New users are only enqueued after the maximum number of running threads is reached.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;Now let's answer the two wrap-up questions of this section:&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhbbhs7fsw3mes5gy5465.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhbbhs7fsw3mes5gy5465.png" alt="section 2 quest" width="800" height="153"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Race Conditions Section&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;Generally speaking, a common cause of race conditions lies in shared resources. For example, when multiple threads concurrently access and modify the same shared data. Examples of shared data are a database record and an in-memory data structure. There are many subtle causes, but we will mention three common ones:&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Parallel Execution:&lt;/strong&gt; &lt;em&gt;Web servers may execute multiple requests in parallel to handle concurrent user interactions. If these requests access and modify shared resources or application states without proper synchronization, it can lead to race conditions and unexpected behaviour.&lt;/em&gt;&lt;br&gt;
&lt;strong&gt;Database Operations:&lt;/strong&gt; &lt;em&gt;Concurrent database operations, such as read-modify-write sequences, can introduce race conditions. For example, two users attempting to update the same record simultaneously may result in inconsistent data or conflicts. The solution lies in enforcing proper locking mechanisms and transaction isolation.&lt;/em&gt;&lt;br&gt;
&lt;strong&gt;Third-Party Libraries and Services:&lt;/strong&gt; &lt;em&gt;Nowadays, web applications often integrate with third-party libraries, APIs, and other services. If these external components are not designed to handle concurrent access properly, race conditions may occur when multiple requests or operations interact with them simultaneously.&lt;/em&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;So, for the next two questions we need to focus on the first image and the last one. You'll get the two answers without problems.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F42be1rzjhzxh3gvm0zy4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F42be1rzjhzxh3gvm0zy4.png" alt="section 3 quest" width="800" height="147"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Web Application Architecture Section&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Client-Server Model: The Foundation&lt;/strong&gt;&lt;/em&gt;&lt;br&gt;
&lt;em&gt;Web applications operate on a client-server model:&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Client:&lt;/strong&gt; &lt;em&gt;This is typically your web browser or mobile app. It sends requests to the server—for example, when you click a button or submit a form.&lt;/em&gt;&lt;br&gt;
&lt;strong&gt;Server:&lt;/strong&gt; &lt;em&gt;This is where the application lives. It receives the client’s request, processes it, and sends back a response—like an HTML page or a confirmation message.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;These interactions happen over a network, and while they may seem instantaneous, there’s always a small delay—this delay is where race conditions can sneak in.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;The Three-Tier Architecture&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;Most modern web apps follow a three-tier architecture:&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Presentation Tier:&lt;/strong&gt; &lt;em&gt;The front-end—HTML, CSS, and JavaScript rendered in your browser.&lt;/em&gt;&lt;br&gt;
&lt;strong&gt;Application Tier:&lt;/strong&gt; &lt;em&gt;The back-end logic—written in languages like Node.js, Python, or PHP—that processes requests and applies business rules.&lt;/em&gt;&lt;br&gt;
&lt;strong&gt;Data Tier:&lt;/strong&gt; &lt;em&gt;The database—MySQL, PostgreSQL, etc.—that stores and retrieves data.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Each tier plays a role in how data flows and how decisions are made, which is crucial when we talk about timing and state transitions.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Exploiting Race Conditions: Machine 1 - Money Transfers&lt;/strong&gt;&lt;/em&gt;&lt;br&gt;
&lt;em&gt;When you transfer money, the app typically:&lt;/em&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Checks if your account has enough funds.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;If yes, it proceeds with the transfer.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;If not, it shows an error.&lt;br&gt;
This seems like a simple two-state system: Transfer Not Sent → Transfer Sent.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;em&gt;But in reality, there’s a hidden third state: Checking Balance. This is a brief moment when the app is verifying your funds but hasn’t yet committed to the transfer. If an attacker sends multiple requests during this window, they might bypass the balance check and transfer more than allowed&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;After starting the Machine and the AttackBox, let's jump into Firefox browser and input the &lt;code&gt;MACHINE_IP:PORT&lt;/code&gt; that is given in the section. Mine is &lt;code&gt;http://10.10.212.218:8080&lt;/code&gt;. We need to open two different window tabs here and log in following this logic: &lt;strong&gt;Tab1 -&amp;gt; Account1, Tab2 -&amp;gt; Account2&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdihp63a8ss64ad6lcn5l.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdihp63a8ss64ad6lcn5l.png" alt="Line 1" width="800" height="266"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;This is the first line that is shown&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp0vvcjeuupr7bvalh9x7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp0vvcjeuupr7bvalh9x7.png" alt="Line 2" width="800" height="288"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;This is the second telephone line shown&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;em&gt;Now we need to fire up our &lt;strong&gt;BurpSuite&lt;/strong&gt; and let the tool intercept via &lt;strong&gt;FoxyProxy&lt;/strong&gt; the session that we are working with. We need the plugin installed and configured on our browser to achieve this task.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Starting with the first account which is &lt;strong&gt;07799991337&lt;/strong&gt;, head over the &lt;strong&gt;Pay and Recharge&lt;/strong&gt; button and press it. We will be landed on the section showed in the next image.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Foylkndz194nv60d3oi3x.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Foylkndz194nv60d3oi3x.png" alt="pay&amp;amp;charge" width="800" height="241"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;From this point on, we need to complete the form with the other line number and input an import like 5$ to transfer. Here's the example before the submission, &lt;strong&gt;DON'T&lt;/strong&gt; hit Transfer! We have to set up our proxy interception first.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fq923qk898xglnl3oh58g.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fq923qk898xglnl3oh58g.png" alt="Example of completition" width="800" height="285"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Let's go to the plug-in section of our browser and set FoxyProxy from &lt;strong&gt;Disable&lt;/strong&gt; to &lt;strong&gt;Burp&lt;/strong&gt; proxy. Head over Burpsuite and check that the intercept is &lt;strong&gt;ON&lt;/strong&gt; in the proxy section. After all those checks it's time to hit the &lt;strong&gt;Transfer&lt;/strong&gt; button.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhcoa27lzyi71sx889sqq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhcoa27lzyi71sx889sqq.png" alt="Burp Intercept Acc1" width="800" height="419"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;It caught the &lt;strong&gt;POST&lt;/strong&gt; request with juicy information. Now we have a clear look on what field is passed and how. Click the right button and then &lt;strong&gt;Send to the Repeater&lt;/strong&gt;. Since we're performing a race condition we have to do a little bit of hacking behind what we've learnt so far.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;In the Repeater section with our tab &lt;strong&gt;1&lt;/strong&gt; opened, we need to send in parallel 20 of those requests in order to score the flag and the amount of 100 dollars on the second telephone line balance. In order to achieve this hit the &lt;strong&gt;+&lt;/strong&gt; near Tab 1 and select Create Tab Group, input a name as you prefer and add the Tab 1 to the group. Then hit &lt;strong&gt;Create&lt;/strong&gt;.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fop0ks73o31ebwkgqo4hk.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fop0ks73o31ebwkgqo4hk.png" alt="Group tabs" width="800" height="290"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;We've created our tab group, now we to click the Arrow near the Tab Group name "Group 1", so we will check that Tab &lt;strong&gt;1&lt;/strong&gt; is inside. Now right click on Tab &lt;strong&gt;1&lt;/strong&gt; and &lt;strong&gt;Duplicate Tab&lt;/strong&gt;. Select 20 times and then you'll make sure that our tab group now contains &lt;strong&gt;21&lt;/strong&gt; Tabs. Before hit Send button we need to check that we've enabled the parallel sending request, otherwise with other options like single connections, separate connections, etc.. &lt;strong&gt;IT WON'T WORK!!&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;In case i've forgot to mention, arrow down under Send button and you'll see this menu here...&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7yw9eamwqnj2kg035utz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7yw9eamwqnj2kg035utz.png" alt="send menus" width="800" height="310"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;With FoxyProxy still on and the intercept on in Burpsuite we can hit t Send in Parallel. After we receive a response with &lt;code&gt;transaction-successfull&lt;/code&gt;code we can go ahead and take the intercept off in Burpsuite. Now let's go to the freezed browser page and let's refresh it. It will appear something like this unusual error.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fog6f2zduxff610swg55o.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fog6f2zduxff610swg55o.png" alt="t.declined" width="800" height="310"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;This is something we want to achieve in order to score the flag from the other account, now try to log in with 071 phone line and check the balance.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0xzwb0y7g73vsnr3epq7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0xzwb0y7g73vsnr3epq7.png" alt="flag_1" width="800" height="205"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Perfect everything worked fine, &lt;strong&gt;THM{PHONE-RACE}&lt;/strong&gt; is our flag. You can reverse the entire procedure for the balance going from the second to the first phone line but it's not mandatory to complete this task.&lt;/em&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;WARNING! Don't get frustrated if you failed the first time, this actually had taken me various days in order to get the flag, various restarting of the Machine and AttackBox. Keep on trying.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Detecting and Mitigating Race Conditions&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;From a business owner's point of view, spotting race conditions can be tricky. For example, if a few users manage to redeem the same gift card more than once, it might go unnoticed unless someone is actively monitoring the logs for unusual activity. Since race conditions can also be used to exploit more subtle system flaws, it's important to involve penetration testers and bug bounty hunters to help uncover and report these issues.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Here are some common ways to prevent race conditions:&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Synchronization Mechanisms:&lt;/strong&gt; &lt;em&gt;Programming languages offer tools like locks to ensure only one thread can access a shared resource at a time.&lt;/em&gt;&lt;br&gt;
&lt;strong&gt;Atomic Operations:&lt;/strong&gt; &lt;em&gt;These are operations that run completely without interruption, ensuring that no other thread can interfere while they’re being executed.&lt;/em&gt;&lt;br&gt;
&lt;strong&gt;Database Transactions:&lt;/strong&gt; &lt;em&gt;Transactions group multiple database actions into a single unit. Either all actions succeed together, or none do—this helps maintain data consistency and prevents conflicts from simultaneous access.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4hay72o43pyta17tezfn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4hay72o43pyta17tezfn.png" alt="no answers" width="800" height="241"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Now we can look for the last challenge in this room, which is...&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Exploiting Race Conditions: Machine 2 - Bank Transfers&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;The key takeaway is this: race conditions exploit the time gap between state transitions.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;If a malicious user can send multiple requests during that tiny window—often just milliseconds—they might trick the system into applying a coupon multiple times or transferring more money than allowed.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step-by-Step Exploit&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;Quit the first machine and start this last one. After few minutes will be displayed &lt;code&gt;MACHINE_IP:PORT&lt;/code&gt;, that in my case is &lt;code&gt;10.10.204.217:5000&lt;/code&gt;. Let's copy and paste this into our Firefox url bar. We will be landing in a log in page. Here we can log in with the first account credentials showed as &lt;strong&gt;Rasser Cond&lt;/strong&gt;.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmmxwwhxgecrcgxlw00cb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmmxwwhxgecrcgxlw00cb.png" alt="dashboard" width="800" height="276"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;We noticed that the account balance is $100, our action logic will be transferring funds from &lt;strong&gt;Rasser&lt;/strong&gt; to &lt;strong&gt;Zadowni&lt;/strong&gt; and a second hop from &lt;strong&gt;Zadowni&lt;/strong&gt; to &lt;strong&gt;Warunki&lt;/strong&gt; in order to score more than $1000 on the account. Basicly the hacking behind this task is equal to task one, so will be sending in parallel request with Burpsuite intercept ON, we will turned OFF when we will receive a &lt;code&gt;transaction-successfull&lt;/code&gt; status back from the application server.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fan1fy4rw5lyg93qwwwik.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fan1fy4rw5lyg93qwwwik.png" alt="First transfer" width="800" height="228"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Let's transfer $95 dollars from Rasser to Zadovni, in the background i've prepared everything to intercept. Let's hit the transfer button and we'll capture the POST request in Burp.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Let's send the request into Repeater, Group Tab with a fancy name like "First Transfer" and duplicate 10 times. Before hitting Send button, set into parallel requests.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frpxbw2awat97nsv0hvjf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frpxbw2awat97nsv0hvjf.png" alt="first burp" width="800" height="312"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Turn intercept OFF and try to log in with &lt;strong&gt;Zadowni&lt;/strong&gt; account. We will find a $400+ in balance, to transfer to &lt;strong&gt;Warunki&lt;/strong&gt;.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgtdmyevikr23wu2a91x7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgtdmyevikr23wu2a91x7.png" alt="second transfer" width="800" height="256"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Second transfer, before continuing make sure that everything in the background is intercepting fine our session!&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4rm065hfbdvgew5l0pzc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4rm065hfbdvgew5l0pzc.png" alt="burp 2 transf" width="800" height="307"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;QUICK TIPS! Try to not overdue when duplicating this second transaction, no more than 3 tabs and the magic will work fine ;)&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frzu9uouxll3rll6hgkw0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frzu9uouxll3rll6hgkw0.png" alt="flag 2" width="800" height="246"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Get the last flag &lt;strong&gt;THM{BANK-RED-FLAG}&lt;/strong&gt; and our job is done here.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🧠 Personal Thoughts&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;What makes race conditions particularly interesting is their non-deterministic nature. Unlike SQL injection or XSS, which are often reliably reproducible, race conditions depend on timing. This makes them harder to detect, test, and fix.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;From a developer’s perspective, it’s a reminder of the importance of atomic operations and locking mechanisms in concurrent environments. From a pentester’s view, it’s a thrilling challenge that requires creativity and precision.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🛡️ Mitigation Strategies&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;To prevent race conditions:&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Use database transactions to ensure atomicity.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Implement locking mechanisms (e.g., mutexes) when accessing shared resources.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Validate state on the server side before and after critical operations.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;em&gt;Rate-limit sensitive actions to reduce the chance of concurrent abuse.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;🧪 Final Thoughts&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;The TryHackMe Race Conditions room is a fantastic hands-on introduction to a subtle yet impactful vulnerability. It teaches not just how to exploit, but also how to think like an attacker—and more importantly, how to defend against such attacks.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;If you’re into web security, this room is a must-try. It’s not just about hacking—it’s about understanding the systems we build and how they can fail in unexpected ways.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>challenge</category>
      <category>tryhackme</category>
      <category>infosec</category>
      <category>learning</category>
    </item>
    <item>
      <title>Solving TryHackMe's "Crack the Hash" Room - A Complete Walkthrough</title>
      <dc:creator>Emanuele</dc:creator>
      <pubDate>Wed, 04 Jun 2025 18:22:42 +0000</pubDate>
      <link>https://dev.to/shadownet0110/solving-tryhackmes-crack-the-hash-room-a-complete-walkthrough-2aig</link>
      <guid>https://dev.to/shadownet0110/solving-tryhackmes-crack-the-hash-room-a-complete-walkthrough-2aig</guid>
      <description>&lt;p&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;Welcome, fellow hackers and learners! In this post, I’ll walk you through my experience solving the "Crack the Hash" room on TryHackMe. This room is a great way to sharpen your skills in hash identification and cracking techniques using tools like Hash-Identifier, John the Ripper, and Hashcat&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Whether you're new to CTFs or brushing up on your skills, this guide will help you understand the logic behind cracking hashes and how to approach each challenge.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Each task in the room gives you a hash and asks you to identify and crack it. The hashes vary in type and complexity, from MD5 to SHA-512 to b-crypt and beyond.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Task 1: The Easy Hashes&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hash:&lt;/strong&gt; 48bb6e862e54f2a795ffc4e541caed4d&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Use Hash-Identifier or online tools like TunnelsUp Hash Analyzer.&lt;/em&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;→ Likely MD5 (since SHA uses CAPITAL LETTERS! while hashing)&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;em&gt;I started the AttackBox previously, command terminal opened, let's do some &lt;strong&gt;HaShCaT&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Since i didn't remember all the modules associated with all the hashing for hashcat, i used Microsoft Copilot to address this issue, you're welcome Satya Nadella ;)&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;em&gt;Before input hashcat prompt i'll create now a file called &lt;code&gt;hash.txt&lt;/code&gt; where we can write our task's hashes each time and crack it with the same command, we will only modify module numbers!&lt;/em&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;nano hash.txt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;em&gt;From now on, we will Copy&amp;amp;Paste each hash one-by-one, from Tryhackme into the clipboard of the AttackBox.&lt;/em&gt;&lt;br&gt;
&lt;em&gt;After saving the first hash in our temporary file, we will prompt the hashcat command by selecting &lt;code&gt;module o&lt;/code&gt; for &lt;strong&gt;MD5&lt;/strong&gt;, a temporary file to write the cracked result called &lt;code&gt;cracked.txt&lt;/code&gt; and our beloved leaked wordlist &lt;code&gt;rockyou.txt&lt;/code&gt;&lt;/em&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;hashcat -m 0 -a 0 -o cracked.txt hash.txt /usr/share/wordlists/rockyou.txt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6qwujpofhhcxjniytaq4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6qwujpofhhcxjniytaq4.png" alt="First Hash command" width="705" height="517"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;A couple of seconds later we have our hash cracked, let's grab the results by simply:&lt;/em&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;cat cracked.txt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj863jfhza2jir9wynmqf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj863jfhza2jir9wynmqf.png" alt="1st result" width="705" height="433"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Done! Very Simple and clean way i should say! Now we will repeat the process of Copy&amp;amp;Paste + the cat of the result.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hash:&lt;/strong&gt; CBFDAC6008F9CAB4083784CBD1874F76618D2A97 &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;→ Likely SHA but what kind?&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;em&gt;Well, here's the solution, a very nice scheme to classify quickly this and the next case:&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsxmultpnn970c0ghlakd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsxmultpnn970c0ghlakd.png" alt="SHA Table" width="800" height="242"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;I'm going SHA-1 following this image.&lt;br&gt;
&lt;/p&gt;
&lt;/blockquote&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;hashcat -m 100 -a 0 -o cracked.txt hash.txt /usr/share/wordlists/rockyou.txt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;em&gt;And Grab the result here:&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzbet24azb4tr421pwcj2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzbet24azb4tr421pwcj2.png" alt="2nd result" width="700" height="373"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hash:&lt;/strong&gt; 1C8BFE8F801D79745C4631D09FFF36C82AA37FC4CCE4FC946683D7B336B63032&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Reflecting the 64 char hash it's SHA-256, so we will craft:&lt;/em&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;hashcat -m 1400 -a 0 -o cracked.txt hash.txt /usr/share/wordlists/rockyou.txt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;em&gt;And the result will be:&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frtthwpaat216lqr1bsw2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frtthwpaat216lqr1bsw2.png" alt="3rd result" width="706" height="219"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hash:&lt;/strong&gt; $2y$12$Dwt1BZj6pcyc3Dy1FWZ5ieeUznr71EeNkJkUlypTsgbX1H68wsRom&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Since there is a little bit of a known pattern &lt;code&gt;$2*$&lt;/code&gt;, we will use Copilot to find evidence of that online and it will tell us that is a &lt;strong&gt;b-crypt&lt;/strong&gt; hash&lt;/em&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Hint and a maybe tip: Add at the end of our known prompt a &lt;code&gt;--force&lt;/code&gt; to kindly speed up the process but be aware that this will take LONGER, and yes even an AMD EPYC processor (which is the one on the AttackBox that i'm using) takes forever to crack given this conditions. (26 days)&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;em&gt;We need an easy way out, let's dig a little bit in Tryhackme, you'll see they want a 4-letter result under this hash. We need to shorten the wordlist &lt;strong&gt;rockyou&lt;/strong&gt; to a new version with only 4-letters attempt. We will call it &lt;code&gt;rockyou4l.txt&lt;/code&gt;&lt;/em&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;iconv -f latin1 -t utf-8 /usr/share/wordlists/rockyou.txt | grep -E '^[a-zA-Z]{4}$' &amp;gt; /usr/share/wordlists/rockyou4l.txt

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;em&gt;Invoke hashcat command with the modified rockyou version and try to get the result:&lt;/em&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;hashcat -m 3200 -a 0 -o cracked.txt hash.txt /usr/share/wordlists/rockyou4l.txt --force
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;em&gt;Grab the result: &lt;strong&gt;bleh&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvxwhr6pdqgxl60brfdcz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvxwhr6pdqgxl60brfdcz.png" alt="bcrypt" width="800" height="160"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hash:&lt;/strong&gt; 279412f945939ba78ce0758d3fd83daa&lt;/p&gt;

&lt;p&gt;&lt;em&gt;A different approach here to spot this Likely-MD5 hash. So first let's check what Hash Analyzer has to tell us.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3ggwy7nj87cz1j9moj83.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3ggwy7nj87cz1j9moj83.png" alt="Hash Analyzer" width="800" height="480"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Second step is to actually try the command that we've put in place for the first hash in MD5.&lt;/em&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Spoiler: NO LUCK! - So it's MD4 then&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;em&gt;We can use md4 modules in hashcat which is &lt;code&gt;-m 900&lt;/code&gt;, but i tried a powerful web MD4 decryptor called dCode.fr&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F92xbx8uuo2yhrzniyy1y.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F92xbx8uuo2yhrzniyy1y.png" alt="dCode" width="800" height="278"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Eternity22&lt;/strong&gt; is our final answer, now we can move into something a little bit spicier.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Task 2: Level 2 Hashes&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;🔐 1. &lt;strong&gt;Hash:&lt;/strong&gt;&lt;br&gt;
F09EDCB1FCEFC6DFB23DC3505A882655FF77375ED8AA2D1C13F640FCCC2D0C85&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Likely Algorithm: SHA-256&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;em&gt;No need to further investigate, let's input &lt;code&gt;-m 1400&lt;/code&gt;and fired up hashcat or we can use another powerful tool called &lt;strong&gt;CrackStation&lt;/strong&gt;!&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7juzax83vxx2bvtz393m.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7juzax83vxx2bvtz393m.png" alt="Crackstation" width="800" height="275"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;So &lt;strong&gt;paule&lt;/strong&gt;, first answer.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;🔐 2. &lt;strong&gt;Hash:&lt;/strong&gt;&lt;br&gt;
1DFECA0C002AE40B8619ECF94819CC1B&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Likely Algorithm: MD4, but after some research online i've discovered that actually is not.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;em&gt;The hash 1DFECA0C002AE40B8619ECF94819CC1B is identified as an NTLM hash based on its length and format:&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;🔍 Why It's NTLM:&lt;br&gt;
&lt;strong&gt;Length:&lt;/strong&gt;&lt;br&gt;
NTLM hashes are 32 hexadecimal characters long (128 bits).&lt;br&gt;
This hash is exactly 32 characters: ✅&lt;br&gt;
&lt;strong&gt;Hexadecimal Format:&lt;/strong&gt;&lt;br&gt;
NTLM hashes are represented in uppercase hexadecimal (0–9, A–F).&lt;br&gt;
This hash fits that pattern: ✅&lt;br&gt;
&lt;strong&gt;No Salt:&lt;/strong&gt;&lt;br&gt;
NTLM hashes are unsalted, meaning the same password always produces the same hash.&lt;br&gt;
This hash doesn't include a salt or any prefix: ✅&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Ok so module &lt;code&gt;-m 1000&lt;/code&gt; for NTLM in hashcat right? Actually i've got also Crackstation that still works for us ;)&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8px5cm4tzlwbc9rpae6r.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8px5cm4tzlwbc9rpae6r.png" alt="NTLM hash" width="800" height="293"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Second answer, done: &lt;strong&gt;n63umy8lkf4i&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;🔐 3. &lt;strong&gt;Hash:&lt;/strong&gt;&lt;br&gt;
$6$aReallyHardSalt$6WKUTqzq.UQQmrm0p/T7MPpMbGNnzXPMAXi4bJMl9be.cfi3/qxIf.hsGpS41BqMhSrHVXgMpdjS6xeKZAs02.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Format: $6$ indicates SHA-512 crypt (used in Linux /etc/shadow)&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;em&gt;Salt: aReallyHardSalt&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;We will use another tool this time that is called &lt;strong&gt;John The Ripper&lt;/strong&gt; since i don't know, hashcat after rebooting the AttackBox into a new session doesn't work anymore :/&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Using the file mentioned previously, &lt;code&gt;hash.txt&lt;/code&gt;, we have to copy and paste this hash and prepare the command for john the ripper that looks like this:&lt;/em&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;john --format=sha512crypt -wordlist=/usr/share/wordlists/rockyou.txt hash.txt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9k3qgx3wvit630a0t9b9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9k3qgx3wvit630a0t9b9.png" alt="John" width="718" height="463"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;It will take some time to run, a long time, but won't crash i'll promise!&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;em&gt;Manage to score the decrypted word &lt;strong&gt;waka99&lt;/strong&gt; after 20 mins-ish, grab the word and onto the next and final hash!&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgtyvu0sv4hlrr2t1hiym.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgtyvu0sv4hlrr2t1hiym.png" alt="waka-waka" width="732" height="580"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;🔐 4. &lt;strong&gt;Hash:&lt;/strong&gt; e5d8870e5bdd26602cab8dbe07a942c8669e56d6&lt;br&gt;
&lt;em&gt;Salt: tryhackme&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Ok, there is a hint, since we're running out of time we need a quick win here...&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4kr1tdkoqrxc6u54ziig.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4kr1tdkoqrxc6u54ziig.png" alt="win" width="457" height="115"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Alright, this means the original message (e.g., a password or token) was hashed using HMAC-SHA1 with the key "tryhackme", and the result was the SHA-1 hash shown. The structure will have &lt;code&gt;&amp;lt;key&amp;gt;:&amp;lt;salt&amp;gt;&lt;/code&gt; format, we will adapt to this pattern our hash + the "tryhackme" salt at the end.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;e5d8870e5bdd26602cab8dbe07a942c8669e56d6:tryhackme&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Nano&lt;/strong&gt; that into the &lt;code&gt;hash.txt&lt;/code&gt; file and we will now adapt the john command line to achieve this last decryption.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;WAIT!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fejex1hc89m5zm32l11gf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fejex1hc89m5zm32l11gf.png" alt="not john sha1" width="800" height="680"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;John doesn't support that and yes, you'll see the final answer here! I came across this website since i was googling weird behaviours i was getting from the terminal. Anyway, i want to crack it by myself. This screen i'll save for later to do double-checks. So, back to hashcat then, after re-installing amd drivers and other forums looked to get back to work, i'll share my command to crack it.&lt;/em&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;hashcat -a 0 -m 160 &amp;lt;hash:salt&amp;gt; /usr/share/wordlists/rockyou.txt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsixhwgmclfpmde1mazkb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsixhwgmclfpmde1mazkb.png" alt="hashcat last" width="736" height="307"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Let it run and it will find the answer, &lt;strong&gt;481616481616&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;"Crack the Hash" is a fantastic room to practice real-world hash cracking techniques. It teaches you how to think like an attacker and gives you hands-on experience with industry-standard tools.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;If you enjoyed this walkthrough or have questions, drop a comment below or connect with me on TryHackMe.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Happy hacking! 🧑‍💻💥&lt;/p&gt;

</description>
      <category>tryhackme</category>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>challenge</category>
    </item>
  </channel>
</rss>
