Sws101_ctf9
Topic : Capture Overview In this “Capture” room on TryHackMe, the challenge revolves around gaining unauthorized access to a web application through a brute-force attack. Reconnaissance To begi...
Topic : Capture Overview In this “Capture” room on TryHackMe, the challenge revolves around gaining unauthorized access to a web application through a brute-force attack. Reconnaissance To begi...
Topic : Hydra Overview The goal is to retrieve two flags by effectively leveraging Hydra’s capabilities to automate the password-guessing process. Hydra Overview Hydra is a versatile and effi...
Topic : Creative Overview This penetration test aims to exploit vulnerabilities on the creative.thm server to obtain the user.txt and root.txt flags. The approach involves conducting an initial...
Topic : GREP Overview The “Grep.v.1.7” challenge is part of TryHackMe’s Red Teaming Path, designed to test participants’ reconnaissance and OSINT (Open Source Intelligence) skills. As an ethica...
Topic : Lesson Learned Overview In this task, we explore the concepts of incident response (IR) and the impact of SQL injection attacks. In this practical challenge, we are tasked with exploiting ...
Topic : CyberHeroes Overview In this challenge, we aimed to uncover a hidden flag within the source code of a login page. This task tested our ability to inspect web pages and understand JavaScr...
Topic : Dig Dug Overview In the “Dig Dug” room on TryHackMe, the objective is to retrieve a flag from a DNS server by making a special DNS request. This involves using DNS enumeration tools to i...
Topic : Committed Overview In the “Committed” room on TryHackMe, the objective is to track down sensitive code that a developer accidentally committed to a GitHub repository. This involves investi...
Topic : Crack the hash Overview This room-crack the hash was very easy to complete which took me around 20 mins with the help of the online toolhashes which cracks the hashes within few seconds. T...
Topic: Recovery System Learning outcomes Understand recovery mechanisms. Analyse database recovery algorithms. Explain the importance of database logging in recovery. Why are recovery sys...