Root HackTheBox
TryHackMe
Introduction:
TryHackMe is a cutting-edge platform for mastering cybersecurity through immersive, gamified learning experiences. Whether you’re a beginner or a seasoned professional, TryHackMe offers a dynamic environment to explore, learn, and practice Cybersecurity in a safe setting.
Why Choose TryHackMe:
- Hands-On Learning: Practice real-world scenarios in virtual environments.
- Gamified Experience: Earn points and badges as you progress.
- Diverse Content: Explore a wide range of Cybersecurity topics.
- Community and Collaboration: Connect with like-minded individuals.
- Structured Learning Paths: Follow guided pathways to specialization.
- Realistic Simulations: Understand and defend against cyber threats.
- Flexibility: Learn at your own pace, anytime, anywhere.
- No Special Hardware: No expensive equipment required.
- Skill Validation: Enhance your employability and career prospects.
Join TryHackMe:
Start your Cybersecurity journey today by signing up for TryHackMe. Unlock your potential, contribute to a safer digital world, and shape the future of online security. Let’s hack the future together!
-
[[Sept 23 2023]] Steel Mountain
Metasploit, Windows Privilege Escalation, CVE 2014-6287
-
[[Dec 29 2023]] BoilerCTF
FTP, sar2html, Privilege Escalation, Cryptography, webmin
-
[[Dec 30 2023]] UltraTech `Security, Pentest, Privilege Escalation, Enumeration, Web Exploitation, API
-
[[Jan 1 2024]] Year of the Rabbit
Puzzle, Challenge, boot-to-root, web, Privilege Escalation, CVE-2019-14287
-
[[Jan 2 2024]] GoldenEye
Hydra, pop3, Nmap, Enumeration, Privilege Escalation, overlayfs exploit
-
[[Jan 8 2024]] Fowsniff_CTF
PortScanning, hashes, bruteforcing, Enumeration, Privilege Escalation, pop3
-
[[Jan 11 2024]] Ice
Windows, Nmap, mimkatz, Metasploit, Windows Privilege Escalation, CVE-2004-1561
-
[[Jan 15 2024]] Biohazard
cipher, base, steganography, root
-
[[Jan 17 2024]] Attacktive Directory
Active Directory, Kerberos, SMB, impacket, ASREPRoasting
-
[[Mar 28 2024]] Archangel
Boot2root, Web exploitation, Privilege escalation, LFI, RCE
-
[[Mar 29 2024]] Tokyo Ghoul
Security, Web, LFI, Hash cracking
-
[[Apr 1 2024]] Internal
Web, SSH Tunneling, Security Misconfiguration, Enumeration, Brute forcing
-
[[Apr 5 2024]] Year of the Fox
sudo, web, filter, tunneling
-
[[Apr 13 2024]] Relevant
Penetest, Privilege Escalation, Security Misconfiguration
-
[[Apr 13 2024]] Watcher
Privilege Escalation, Security, LFI, Web
-
[[Apr 16 2024]] Year of the Owl
SNMP, Privilege Escalation, Bruteforcing, Enumeration, Pentest, Disclosure, Windows
-
[[Apr 18 2024]] TryHack3M: Bricks Heist
CVE-2024–25600, RCE, Bitcoin, Wordpress, Threat Hunting
-
[[May 4 2024]] Breaching Active Directory
Active Directory, Security, Network
-
[[May 16 2024]] RazorBlack
Kerberoastin, AS-REP Roasting, Active Directory, Hash Cracking, crackmapexec
-
[[May 24 2024]] VulnNet: Roasted
Kerberoasting, AS-REP Roasting, Active Directory, Powershell
-
[[May 27 2024]] VulnNet: Active
Active Directory, SMB, Redis, Bloodhound
-
[[May 29 2024]] Reset
Active Directory, SMB, Delegation, Bloodhound
-
[[May 30 2024]] specter
LFI, web, brute force, enumeration
-
[[Jun 11 2024]] Airplane
LFI, web, Linux, enumeration
-
[[Jun 21 2024]] Ra
Responder, CVE-2020-12772, windows, Active Directory