Try Hackme Advent of Cyber Day1 to Day6 Walkthrough
So this is a website where you can get man challenges and box that you can root to improve your knowledge. Today I am going to solve the Advent_Of_Cyber the 25 days challenge for complete beginners The link is given below https://tryhackme.com/dashboard
Day 1(Task 6)
So we are given with a login website and we have to register on it using any credentials you want

After loggin in we have the following screen inspecting the cookies on the website we have the following results

we have an cookie authid and it seems to be urlencoded and base64 encoded

On decoding it we have authid=ghi########## here the hidden part show the constant part of cookie
so now we change the user to mcinventory and forge the cookie and inject it into the browser authid=mcinventory##########

so now we have the answers for Task 6
Day2(Task 7)
Now we are give a url and we have to find the hidden directries at the given url using gobuster for the job
gobuster -u http://<ur-machine-ip>:3000 -w /usr/share/dirb/common.txt

now on to the directory we get a admin login page looking at the source we have

searching for the repository on github

now entering the default creds
And We have successfully completed the task :)
Day3(Task 8)
This is a forensics challenge we have to basically just answer the questions on the site by looking at the pcap file
For ques 1

###for ques 2

###for ques 3 we have to save the hash found in the output above and crack the hash with hashcat using rockyou.txt as given in the hint

One more Day complete :)
Day4(Task 9)
This task is about basic understanding of linux and moving around in linux
ques 1
to see number of visible files serioulsy :(

ques 2
use cat to see the contest EzPz

ques 3
grep -r password
using the command about the grep recursively this help us save time rather that perform grep on each file

ques 4
grep -r '[0-9]\{1,3\}\.[0-9]\{1,3\}\.[0-9]\{1,3\}\.[0-9]\{1,3\}'
here using a regex string we can easily carve out the IP address

ques 5
cat /etc/passwd |grep /bin/bash
using this we can see how many users have shell access to the machine

ques 6
sha1sum file8
using the sha1sum command to get the hash

ques 7
Since we don’t have permissions to read /etc/shadow file so we find other files having string shadow in it and to which we have permission to read
find / -name "*shadow*" 2>/dev/null

we get an interesting shadow.bak file which we can so reading it we find the mcsysadmin’s password hash

Day5(Task 10)
This is standard OSINT introductory challenge
we are given with an jpeg image running exiftool on it gets us the username as the creator tag in exiftool output

Now using any osint username finder try to find the link to username accounts


We got the username
Lets checkout the twitter account with the found username

We get the answers to the first three questions :)
now lets go to the wordpress site linked in the description
There was a mention of wayback machine in the hints section lets look at the results of wayback machine

lets check the oldest snapshot of the website we get the answers to other to question by viewing the oldest version of this website
Day6(Task 11)
We are given a pcap file and asked some questions about the data in the pcap
ques 1
here on following through the udp streams we get a a string that seems to encoded so we decode it to get the answer


ques 2
Looking through the http request we see that there is a zip file and a jpeg image so we export them from wireshark

We can use steghide with empty password to get the data from jpeg file
steghide extract -sf TryHackMe.jpeg
ques 3
we can use John to crack the password of zip file
zip2john christmaslists.zip > hash
john hash
Comments