The Sticker Shop
The Try Hack Me room can be found here. Your local sticker shop has finally developed its own webpage. They do not have too much experience regarding web development, so they decided to develop and host everything on the same computer that they use for browsing the internet and looking at customer feedback. Smart move! […]
Silver Platter

Silver Platter @ TryHackMe Rust scan showed three ports open 22,80,8080 rustscan -a 10.10.167.171 .—-. .-. .-. .—-..—. .—-. .—. .–. .-. .-. | {} }| { } |{ {__ {_ _}{ {__ / ___} / {} | `| | | .-. | {_} |.-._} } | | .-._} } }/ / | | | […]
mKingdom
mKingdom room can be found here. I started off with a Rustscan, I also did a full Nmap scan but nothing new to add. HTTP is being hosted on port 85. Going to the website, I was greeted with a fine image to remind me of my failures in life. A little too soon, Bowser. […]
TryHackMe – IDE Walkthrough
Introduction In this write-up, I will walk through my process of exploiting the TryHackMe IDE machine, gaining an initial foothold, escalating privileges, and ultimately capturing the root flag. Enumeration 1. Scanning for Open Ports I started with an Nmap scan to discover open services: This revealed the following key findings: 2. FTP Enumeration Anonymous FTP […]
Investigating an Android Backup – Hack The Box Write-Up
Challenge Overview This challenge provided a downloadable file named cat.ab, which was identified as an Android Backup file. The goal was to analyze the backup and extract hidden information, ultimately leading to the discovery of the flag. Step 1: Identifying the File Type After downloading the file, I used the strings command to inspect its […]
MadnesS
For this box, you really should think “Outside the box.” With all boxes, I start with an NMAP scan. This is what NMAP came back with. Just a reminder, this is an all port scan “-p-” If you want to run a top port scan, you can remove the “-p-“. The scan revealed an SSH […]