Oct. 7, 2023, 11:10 a.m. | Ömer Erdal

System Weakness - Medium systemweakness.com

Relevant — TryHackMe Walkthrough

Hello, everyone! I am here to lead you through a TryHackMe room that I found particularly captivating, titled ‘Relevant.’ While there are various methods available on the internet for obtaining a root shell on the vulnerable machine, I will be sharing my approach in this blog.

1- Enumeration

As usual, we will start by enumerating the target machine using a network scanner to identify open ports. To accomplish this, we can execute an Nmap command:

“nmap …

ctf-writeup ethical hacking penetration testing relevant tryhackme-walkthrough

Senior Security Officer

@ eSimplicity | Remote

Senior - Automated Cyber Attack Engineer

@ Deloitte | Madrid, España

Public Key Infrastructure (PKI) Senior Engineer

@ Sherwin-Williams | Cleveland, OH, United States

Consultant, Technology Consulting, Cyber Security - Privacy (Senior) (Multiple Positions) (1502793)

@ EY | Chicago, IL, US, 60606

Principal Associate, CSOC Analyst

@ Capital One | McLean, VA

Real Estate Portfolio & Corporate Security Lead

@ Lilium | Munich