Learn how to exploit Server-Side Request Forgery (SSRF) vulnerabilities, allowing you to access internal server resources. THM Room https://tryhackme.com/room/ssrfqi TASK 1 : What is an SSRF? What...
This room introduces file inclusion vulnerabilities, including Local File Inclusion (LFI), Remote File Inclusion (RFI), and directory traversal. THM Room https://tryhackme.com/room/fileinc TASK 1...
THM Room https://tryhackme.com/room/idor TASK 1 : What is an IDOR? What does IDOR stand for? Answer : Insecure Direct Object Reference TASK 2 : An IDOR Example What is the Flag from the IDOR exa...
THM Room https://tryhackme.com/room/authenticationbypass TASK 1 : Brief I have started the machine. No answer TASK 2 : Username Enumeration What is the username starting with si*** ? root@ip-10-...
THM Room https://tryhackme.com/room/subdomainenumeration TASK 1 : Brief What is a subdomain enumeration method beginning with B? Answer : Brute Force What is a subdomain enumeration method beginn...
Learn the various ways of discovering hidden or private content on a webserver that could lead to new vulnerabilities. THM Room https://tryhackme.com/room/contentdiscovery TASK 1 : What Is Content...
THM Room https://tryhackme.com/room/introtoisac TASK 1 : Introduction Read the above and move on to ‘What are ISACs’. No Answer TASK 2 : Basic Terminology Read the above and familiarize yourself ...
THM Room https://tryhackme.com/room/yara TASK 1 : Introduction Let’s get started No Answer TASK 2 : What is Yara? 2.3. Caveat: Malware Analysis Explaining the functionality of malware is vastly o...
This room will discuss the various resources MITRE has made available for the cybersecurity community. THM Room https://tryhackme.com/room/mitre TASK 1 : Introduction to MITRE Read the above No An...
THM Room https://tryhackme.com/room/meterpreter TASK 1 : Introduction to Meterpreter No answer needed No Answer TASK 2 : Meterpreter Flavors No answer needed No Answer TASK 3 : Meterpreter Comma...
A new version of content is available.