WriteUP – SeeTwo – TryHackMe [THM] – Medium
You are tasked with looking at some suspicious network activity by your digital forensics team. The server has been taken out of production while you analyze the suspicious behavior. Click…
You are tasked with looking at some suspicious network activity by your digital forensics team. The server has been taken out of production while you analyze the suspicious behavior. Click…
Compromise the machine and get the flags.
Welcome to the Brains challenge, part of TryHackMe’s Hackathon! All brains gathered to build an engineering marvel; however, it seems strangers had found away to get in.
Pyrat receives a curious response from an HTTP server, which leads to a potential Python code execution vulnerability. With a cleverly crafted payload, it is possible to gain a shell…
We think our system is secure, hack it and prove us wrong.
With the Hammer in hand, can you bypass the authentication mechanisms and get RCE on the system?
Welcome to the web application of U.A., the Superhero Academy. Let's try to hack us...
We need to recover the lost Ambrosia shipment from the NSF (National Secessionist Forces), the only treatment for the plague known as the Grey Death. However, we haven't located their…
In the mystical realm of Cyberspace, there once dwelled a mischievous sorcerer named Stefan. Known for his cunning wit and insatiable thirst for digital knowledge, Stefan crafted a wondrous digital…
The "Publisher" CTF machine is a simulated environment hosting some services. Through a series of enumeration techniques, including directory fuzzing and version identification, a vulnerability is discovered, allowing for Remote…