Close Menu
    What's Hot

    Why GRC Services Are Vital for Business Growth and Compliance in 2025

    July 1, 2025

    Ultimate Guide to Attack Surface Scanning

    April 10, 2025

    Recent Trends in Zero Trust Architecture

    March 3, 2025
    Facebook X (Twitter) Instagram LinkedIn WhatsApp
    HITH Blog – HackerinthehouseHITH Blog – Hackerinthehouse
    • Bug Bounty

      A Beginner’s guide to Active Directory Penetration Testing

      June 21, 2023

      Building an XSS Scanner with Python

      February 27, 2023

      Journey to Website Security: Uncovering Hyperlink Injection Dangers

      February 24, 2023

      File Upload XSS | Find XSS in a different way while doing Bug bounty and Pentesting

      January 13, 2023

      How To Find DOM-based XSS Vulnerability

      December 27, 2022
    • Pen Testing

      Privileged Escalation: How Hackers Exploit Permissions to Compromise Your Systems

      March 5, 2024

      The Ultimate Guide to Vulnerability Scanning

      December 13, 2023

      Top 10 Tools for Real World Red Teaming

      November 18, 2023

      Locking Down OAuth 2.0: Critical Steps to Protect User Accounts and Data

      November 10, 2023

      Detailed guide on Password Transmutations

      April 29, 2023
    • Cyber Security

      Why GRC Services Are Vital for Business Growth and Compliance in 2025

      July 1, 2025

      Ultimate Guide to Attack Surface Scanning

      April 10, 2025

      Recent Trends in Zero Trust Architecture

      March 3, 2025

      Modern Defensive Cybersecurity Services

      December 29, 2024

      A Comprehensive Guide on Cyber Security Services VS Cyber Security Products

      June 14, 2024
    • Services
    • Product
      • Certifications
    • More
      1. Ethical Hacking
      2. Kali Linux
      3. Write Ups
      4. CTF
      5. Blockchain
      6. Machine Learning
      7. Computer Science
      8. View All

      Journey to Website Security: Uncovering Hyperlink Injection Dangers

      February 24, 2023

      Pentest/VAPT RoE and Best Practices

      February 3, 2023

      Emoji Deploy Attack Chain

      January 24, 2023

      Introduction to Information Security

      January 11, 2023

      Cyber Security Roadmap (Part-2)

      October 25, 2022

      How to install waybacksurls in kali linux (2022)

      September 23, 2022

      How To Find Hidden Parameters

      November 12, 2022

      Top 10 Subdomain Takeover Reports

      November 6, 2022

      Pause DeSync Attack :

      November 3, 2022

      Bypassing OTP Verification Methods

      October 31, 2022

      Tryhackme Vulnversity walkthrough

      September 26, 2022

      Why GRC Services Are Vital for Business Growth and Compliance in 2025

      July 1, 2025

      Ultimate Guide to Attack Surface Scanning

      April 10, 2025

      Recent Trends in Zero Trust Architecture

      March 3, 2025

      Modern Defensive Cybersecurity Services

      December 29, 2024

      A Peek into Facial Recognition Technology

      August 21, 2023

      How Data Scientists and Machine Learning Engineers Differs

      November 8, 2022

      Artificial Neural Networks with ML

      November 4, 2022

      INTRODUCTION TO MACHINE LEARNING

      October 20, 2022

      Robotic Process Automation: The Key to Effortless Efficiency

      September 18, 2024

      BCI: Merging Minds With Machines

      August 18, 2023

      Is Quantum Computing the future of Computing?

      August 16, 2023

      Why GRC Services Are Vital for Business Growth and Compliance in 2025

      July 1, 2025

      Ultimate Guide to Attack Surface Scanning

      April 10, 2025

      Recent Trends in Zero Trust Architecture

      March 3, 2025

      Modern Defensive Cybersecurity Services

      December 29, 2024
    HITH Blog – HackerinthehouseHITH Blog – Hackerinthehouse
    Home»CTF»Tryhackme Vulnversity walkthrough
    CTF

    Tryhackme Vulnversity walkthrough

    By KRiPPto99September 26, 2022Updated:October 2, 2022No Comments5 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Complete guide to vulnversity Walkthrough

    Vulnersity is free room of tryhackme, before get started let me remind something you need to complete this below rooms for better understanding

    1. #Level 1- intro
      -OpenVPN https://tryhackme.com/room/openvpn
      -Welcome https://tryhackme.com/jr/welcome
      -Intro to Researching https://tryhackme.com/room/introtoresearch
      -Learn Linux https://tryhackme.com/room/zthlinux
      -Crash Course Pentesting https://tryhackme.com/room/ccpentesting
    • Introductory CTFs to get your feet 

    -Google Dorking https://tryhackme.com/room/googledorking
    -OHsint https://tryhackme.com/room/ohsint
    -Shodan.io https://tryhackme.com/room/shodan

     

     

    2.# Level 2 – Tooling
    -Tmux https://tryhackme.com/room/rptmux
    -Nmap https://tryhackme.com/room/rpnmap
    -Web Scanning https://tryhackme.com/room/rpwebscanning
    -Sublist3r https://tryhackme.com/room/rpsublist3r
    -Metasploit https://tryhackme.com/room/rpmetasploit
    -Hydra https://tryhackme.com/room/hydra
    -Linux Privesc https://tryhackme.com/room/linuxprivesc
    -Web Scanning https://tryhackme.com/room/rpwebscanning

    Walkthrough

    Task 1: Deploy the machine

    Here in step one you have to need to do is just deploy the machine

    Question 1: Deploy the machine

    Answer : No answer needed

    Task 2: Reconnaissance

    First step of every CTF or penetration test is to perform recon phase on the target , here there are two types of recon active and passive

    Active scanning:
    An active vulnerability scanner sends transmissions of “test traffic” to the nodes or endpoints on the enterprise network. It then examines the responses received from these nodes to assess which node represents a weak point.

    passive scanning:
    A passive vulnerability scanner watches the network’s traffic flow to collect information about its systems and endpoints. Unlike active scanners, a passive scanner does not directly interact with these systems by sending a probe request or requesting a probe response

    Here we are using nmap for network scanning nmap is open source tool which helps to detects host, network and more details basically we are gathering information about the machine I would like to suggest please go through https://tryhackme.com/room/furthernmap  and this and comeback here

    Now we are going to scan using nmap

    scan the box: nmap -sV <machines ip>

    Question 1: There are many nmap “cheatsheets” online that you can use too.

    answer: No answer needed

    Question 2: Scan the box, how many ports are open?

    answer: 6

     

    Question 3: What version of the squid proxy is running on the machine?

    answer: 3.5.12

    Question 4: How many ports will nmap scan if the flag -p-400 was used?

    answer: 400

     

    Question 5: Using the nmap flag -n what will it not resolve?

    answer: DNS

     

    Question 6: What is the most likely operating system this machine is running?

     

    answer: ubuntu
    Question 6: Its important to ensure you are always doing your reconnaissance thoroughly before progressing. Knowing all open services (which can all be points of exploitation) is very important, don’t forget that ports on a higher range might be open so always scan ports after 1000 (even if you leave scanning in the background)
    answer: no answer needed

    Task 3: Locating Directories using GoBuster

    Here we are going to deep dive into directory here we are going to use tool called gobuster for fast directory discovery

     

    To download Gobuster for kali linux use this command

    sudo apt-get install gobuster

    if you are using Kali Linux you can find many wordlists under /usr/share/wordlists.

    Now lets run GoBuster with a wordlist: gobuster dir -u http://<ip>:3333 -w <word list location>

     

    Question: What is the directory that has an upload form page?

    answer: /internal/

    Task 4: Compromise the webserver

    now we already found a form to upload files , now we can leverage this upload and execute our payload and compromising the web server

    Question 1: What common file type, which you’d want to upload to exploit the server, is blocked? Try a couple to find out.

    answer: .php

    Question 2:  We’re going to use Intruder (used for automating customised attacks). To begin, make a wordlist with the following extensions in:

     

    To do this, we’re going to use BurpSuite. If you are unsure to what BurpSuite is, or how to set it up please complete our BurpSuite room first

    now we are going to use intruder to begin , make a wordlist with the following extension in:

    Now make sure BurpSuite is configured to intercept all your browser traffic. Upload a file, once this request is captured, send it to the Intruder. Click on “Payloads” and select the “Sniper” attack type.

    Click the “Positions” tab now, find the filename and “Add §” to the extension. It should look like so

     

    Question 3: Run this attack, what extension is allowed?

    answer: .phtml

    Question 4:  What is the name of the user who manages the webserver?

    answer: Bill

    Question 5: What is the user flag?

    answer: 8bd7992fbe8a6ad22a63361004cfcedb

    Task 5: Privilege Escalation

    Now that we have gained a foothold, it’s time to escalate our privileges! This is a hugely important part of pentesting, commonly referred to as privesc.

    In this example, we are going to be exploiting SUID file permissions

    Question 1: On the system, search for all SUID files. What file stands out?

    answer: /bin/systemctl

    Question 2: Become root and get the last flag (/root/root.txt)

    answer: a58ff8579f0a9270368d33a9966c7fd5

    Boom! we did it congrats!!!🥳

    Author

    • KRiPPto99

      View all posts

    Cyber-Security tryhackme tryhackme vulnersity vulnersity Writeups
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleConcept behind Origin IP and how to find it?
    Next Article Introduction to SOC Analyst Jobs and Career Paths
    KRiPPto99

    Related Posts

    Cyber Security

    Why GRC Services Are Vital for Business Growth and Compliance in 2025

    July 1, 2025
    Cyber Security

    A Comprehensive Guide to Security Compliance

    May 6, 2024
    Cyber Security

    A Comprehensive Guide to APT

    March 10, 2024
    Add A Comment
    Leave A Reply Cancel Reply

    Advertisement
    Top Posts

    How to install waybacksurls in kali linux (2022)

    September 23, 20222,606 Views

    File Upload XSS | Find XSS in a different way while doing Bug bounty and Pentesting

    January 13, 2023913 Views

    OSCP Cheat Sheet

    October 16, 2022864 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Advertisement
    X (Twitter) Instagram LinkedIn WhatsApp Telegram
    • About us
    • Contact Us
    • Privacy Policy
    • Terms
    © 2025 HITH Blog. Powered by Hackerinthehouse.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.