This is Thumbnail

TryHackMe Keldagrim Walkthrough

Room Link: Keldagrim Room Link We gonna start with NMAP scan: Even if it is showing that these ports are filtered we are going to check it by visiting the website on port 80. add the IP to the /etc/hosts. okay we can visit the website and we can see that there multiple things listed on the website, from that we can enumerate more on the directories. upon seeing the website, there is /admin which is greyed out and visiting it isn’t showing anything. ...

February 3, 2026 · 3 min · 600 words
This is Thumbnail

TryHackMe Airplane Walkthrough

Room Link: Airplane Room Link First of all add the machine IP to /etc/hosts As always we will perform a NMAP scan: $ nmap -sT -p- airplane.thm -T4 Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-07 20:01 CEST Nmap scan report for airplane.thm (10.10.196.89) Host is up (0.064s latency). Not shown: 65532 closed tcp ports (conn-refused) PORT STATE SERVICE 22/tcp open ssh 6048/tcp open x11 8000/tcp open http-alt We found 3 open Ports here: ...

February 2, 2026 · 5 min · 922 words
This is Thumbnail

TryHackMe Smag Grotto Walkthrough

Room Link: Smag Grotto Room Link NMAP Scan we can see there are 2 services on port 22 and port 80. we will check out port 80. upon directory enumeration, we found an interesting directory on the website lets explore it, here we can see an attachment with .pcap extension, let’s download it and open it with wireshark. as you can see in the image we upon examining the POST request, we found out the credentials, now we are going to try them in on the HOST website i.e development.smag.thm . ...

January 30, 2026 · 2 min · 365 words
This is Thumbnail

TryHackMe OWASP Application Design Flaws Walkthrough

These Design Flaws Contain: 1. AS02: Security Misconfigurations 2. AS03: Software Supply Chain Failures 3. AS04: Cryptographic Failures 4. AS06: Insecure Design AS02: Security Misconfigurations Happens when system, servers or applications are deployed with unsafe defaults, incomplete settings, or exposed services. These are not code bugs but mistakes in how the environment, software or network is set up. They create easy entry points for attackers. even a small misconfig can expose sensitive data, enable priv esc, of give foothold to the attackers. Modern applications rely on complex stacks, cloud services, and third-party APIs. A single exposed admin panel, an open storage bucket, or misconfigured permissions can compromise the entire system. ...

January 9, 2026 · 6 min · 1227 words
This is Thumbnail

TryHackMe OWASP Insecure Data Handling Walkthrough

This room will introduce you to 3 elements of the OWASP Top 10 list (2025). In this room, you will learn about the elements relating to application behaviour and user input. We will cover these vulnerabilities briefly, how to prevent them, and finally, you will practice exploiting these vulnerabilities: A04: Cryptographic Failures A05: Injection A08: Software or Data Integrity Failures How to Prevent Cryptographic Failures Preventing cryptographic failures starts with choosing strong, modern algorithms and implementing them properly. Sensitive information such as passwords should be hashed using robust, slow hashing functions like bcrypt, scrypt, or Argon2. When encrypting data, avoid creating your own algorithms; instead, rely on trusted, industry-standard libraries. ...

January 9, 2026 · 3 min · 491 words