Skip to main content

CTF write-ups

A Collection Of My Writeups for Various Capture the Flag challenges. Mostly from TryHackMe

TryHackMe: Internal

·1560 words·8 mins
A hard TryHackMe box that chains WordPress brute-forcing, PHP webshell injection, credential harvesting from a plaintext file, and a Ligolo-ng pivot to an internal Jenkins instance — ultimately escalating to root via a plaintext password left in a Docker container.

TryHackMe: Enterprise

·1821 words·9 mins
A hard TryHackMe Active Directory box that chains anonymous SMB/LDAP enumeration, OSINT credential recovery from a public Git repository, Kerberoasting, and PrintNightmare (CVE-2021-1675) local privilege escalation to fully compromise the domain.

TryHackMe: Daily Bugle

·1633 words·8 mins
A hard TryHackMe box exploiting a known Joomla 3.7 SQL injection vulnerability to extract and crack admin credentials, followed by a PHP webshell for initial access and a yum sudo misconfiguration for privilege escalation to root.

TryHackMe: RabbitStore

·1537 words·8 mins
A medium TryHackMe box chaining mass assignment, SSRF, and Jinja2 SSTI to gain initial access, then escalating to root by leveraging an exposed Erlang cookie to extract credentials from a misconfigured RabbitMQ service.

TryHackMe: Hammer

·1795 words·9 mins
A Medium Rated PHP web app challenge chaining exposed logs, OTP brute force via rate limit bypass, and JWT forgery to achieve remote command execution

TryHackMe: Include

·1825 words·9 mins
Medium difficulty web challenge focusing on server side vulnerabilities

TryHackMe: K2-Summit

·2471 words·12 mins
Hard Active Directory box Leverage credential reuse for initial access, identify a privileged user via BloodHound, hijack a scheduled script for lateral movement, then perform an RBCD attack to compromise the root domain controller

TryHackMe: K2-MiddleCamp

·2615 words·13 mins
Hard Active Directory environment consisting of enumeration, credential spraying, BloodHound analysis, privilege escalation via Backup Operators group

TryHackMe: K2-BaseCamp

·3094 words·15 mins
Hard Linux Box including: web enumeration, vhost discovery, jwt token manipulation, SQL Injection, Linux Privilege Escalation

TryHackMe: AVenger

·3027 words·15 mins
Medium difficulty Active Directory box focusing on Web Enumeration, File Upload Abuse, AV Evasion, Uac bypass

TryHackMe: Reset

·1845 words·9 mins
A hard Active Directory compromise that chained weak credential hygiene, SMB guest access, password spraying, AS-REP roasting, and registry credential leaks into a full BloodHound-guided escalation, ultimately abusing Kerberos delegation (RBCD) to impersonate Administrator and achieve domain compromise.

TryHackMe: Injectics

·1629 words·8 mins
A medium difficulty web exploitation chain where exposed admin interfaces, logic flaws, and SQL injection were leveraged to reset credentials, ultimately escalating to admin access and achieving RCE via a vulnerable Twig SSTI.