91 posts tagged with "THM"
View All TagsTHM | AoC 2025 | Day 18
THM | AoC 2025 | Day 17
THM | AoC 2025 | Day 16
THM | AoC 2025 | Day 15
THM | AoC 2025 | Day 14
THM | AoC 2025 | Day 13
THM | AoC 2025 | Day 12
THM | AoC 2025 | Day 10-11
THM | AoC 2025 | Day 09 + SideQuest 2 Key
THM | AoC 2025 | Day 08
THM | AoC 2025 | Day 06-07
THM | AoC 2025 | Day 05 + Bonus
THM | AoC 2025 | Day 03-04
THM | AoC 2025 | Day 02
THM | AoC 2025 | Day 01 + SideQuest 1 Key
THM | AoC 2025 | Day 00
THM | Windows Privilege Escalation

Red Teaming | Windows Privilege Escalation | Description:
Notes taken while exploring the Windows Privilege Escalation room on the Red Teaming Path. The primary goal is to master the fundamentals of Windows privilege‑escalation techniques.
THM | Enumeration

Red Teaming | Enumeration | Summary:
This room is designed to introduce learners to post-exploitation enumeration techniques within unknown corporate environments.
It covers both Linux and Windows systems, detailing various methods for gathering system information, identifying users, understanding networking configurations, and listing running services.
The room also explores DNS, SMB, and SNMP protocols, along with additional tools like Sysinternals Suite, Process Hacker, and GhostPack Seatbelt, specifically for Windows enumeration.
THM | The Lay of the Land

Red Teaming | The Lay of the Land | Summary:
This room offers hands-on learning about corporate security technologies. It covers Active Directory (AD) management, host solutions like antivirus, firewalls, Sysmon, HIDS/HIPS, EDR, network security with firewalls, SIEM, and IDS/IPS, plus applications and services including installed programs, processes, file sharing, DNS, local apps.
More importantly, it equips learners with practical knowledge of corporate security infrastructures.
THM | Phishing

Red Teaming | Phishing | Summary:
This room focuses on teaching the basics of phishing attacks and their importance in red team engagements.
The room takes you through various aspects of phishing, including setting up infrastructure, writing convincing emails, and using different tools like GoPhish and techniques like Typosquatting to trick targets into opening malicious links or attachments.
THM | Password Attacks

Red Teaming | Password Attacks | Summary:
This room is designed to teach about various strategies and techniques used in cracking or guessing passwords. It covers both offline and online methods, including dictionary and brute-force attacks, rule-based attacks, and custom rules.
The room emphasizes password profiling, teaching users how to create effective wordlists using default, weak, leaked, combined, and username sources.
Other topics include keyspace techniques, CUPP (Custom Password Profile), and online attacks targeting FTP, SMTP, SSH, and HTTP login pages. Additionally, it introduces the concept of password spraying attacks.
THM | Weaponization

Red Teaming | Weaponization | Summary:
The room focuses on alternative scripting techniques used by red teamers to execute payloads in a Windows environment.
Since many organizations restrict or monitor the execution of
.exefiles, this room explores other methods, including Windows Script Host, HTML Applications, Visual Basic Applications, and PowerShell.
The goal is to learn and practice these techniques, which are commonly used by attackers to bypass security controls and execute malicious code.
THM | Red Team Recon

Red Teaming | Red Team Recon | Summary:
The room provides training on different types of reconnaissance, including WHOIS and DNS-based reconnaissance, advanced searching techniques, and specialized search engines.
Additionally, it delves into specific tools and techniques such as Google Hacking, Recon-ng, and Maltego, offering a comprehensive understanding of the reconnaissance process in a cyber attack or penetration test scenario.
Overall, it aims to equip users with the skills and knowledge necessary to gather valuable information about a target using various reconnaissance methods and tools.
THM | Intro to C2

Red Teaming | Intro to C2 | Summary:
This room is an introduction to the world of Command and Control (C2) frameworks, where you'll learn about the basics of C2 structures, obfuscation techniques, common C2 frameworks, setting up a C2 framework, basic operation procedures, and advanced setup concepts.
THM | Red Team OPSEC

Red Teaming | Red Team OPSEC | Summary:
This room is focused on applying the OPSEC process in the context of Red Team operations. The content likely covers strategies and techniques for protecting sensitive information from adversaries, including identifying threats, vulnerabilities, and risks, and implementing countermeasures to stay one step ahead.
THM | Red Team Threat Intel

Red Teaming | Red Team Threat Intel | Summary:
In this room, you'll learn how to harness the power of threat intelligence in red team engagements. You'll discover how to apply threat intel concepts to drive your campaigns, understand key frameworks like TIBER-EU, and practice using threat intelligence to inform your tactics, techniques, and procedures (TTPs).
Through interactive challenges and real-world examples, you'll gain a deeper understanding of how to create a threat-intel-driven campaign that sets you apart as a red team operator.
THM | Red Team Engagements

Red Teaming | Red Team Engagements | Summary:
This room serves as a guide for Red Team engagements, covering essential steps such as defining scope and objectives, establishing rules of engagement, and planning campaigns, to ensure successful execution and effective documentation of the exercise.
It provides a structured approach to setting up and conducting a Red Team engagement, from conceptualizing the project to executing it, including key operational plans and mission-specific details.
THM | Red Team Fundamentals

Red Teaming | Red Team Fundamentals | Summary:
The aim of this room is to provide an introduction to the basics of red team engagements , their components, and the stakeholders involved.
Lastly, it tries to explain the main distinctions between red teaming, vulnerability assessments, and penetration testing.
THM | Windows Internals
THM | x86 Assembly Crash Course

Malware Analysis | x86 Assembly Crash Course | Summary:
The room discusses various aspects of x86 assembly language programming, covering essential concepts such as opcodes and operands, general assembly instructions, arithmetic and logical instructions, conditionals, and branching instructions.
It also includes some warnings about the use of these instructions in real-world scenarios, particularly related to shellcode injection.
THM | x86 Architecture Overview

Malware Analysis | x86 Architecture Overview | Summary:
The room provides an overview of CPU architecture, explaining how it executes instructions and interacts with external components. It details the basic components of a CPU (Control Unit, Arithmetic Logic Unit, Registers) and how they interact with memory and I/O devices.
It then delves deeper into registers, explaining their types (Instruction Pointer, General-Purpose Registers, Status Flag Registers), and how they are used to store data temporarily while it is being processed by the CPU. Additionally, the room covers program memory layout, highlighting the importance of the stack in malware analysis, and explains common malware techniques such as stack buffer overflow attacks.
THM | Intro to Malware Analysis

Malware Analysis | Intro to Malware Analysis | Summary:
The aim of this room is to provide SOC analysts with steps to determine whether suspicious content (files or traffic) is malicious or not. It will cover the basics of malware, how to start analyzing it, and different analysis methods, as well as resources for further assistance.
THM | AoC 2024 | Day 17-24
THM | AoC 2024 | Day 09-16
THM | AoC 2024 | Day 01-08
THM | AoC 2024 | Day 00
THM | Walking An Application
THM | Hydra
THM | Nessus
THM | Steel Mountain
Basic Computer Exploitation | Steel Mountain | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Complete Beginner path on the TryHackMe website. It is based on the learning content provided in the Steel Mountain room.
THM | Kenobi
THM | Basic Pentesting
Basic Computer Exploitation | Basic Pentesting | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Complete Beginner path on the TryHackMe website. It is based on the learning content provided in the Basic Pentesting room.
THM | Vulnversity
Basic Computer Exploitation | Vulnversity | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Complete Beginner path on the TryHackMe website. It is based on the learning content provided in the Vulnversity room.
THM | Linux PrivEsc
Shells and Privilege Escalation | Linux PrivEsc | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Complete Beginner path on the TryHackMe website. It is based on the learning content provided in the Linux PrivEsc room.
THM | Common Linux Privesc
Shells and Privilege Escalation | Common Linux Privesc | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Complete Beginner path on the TryHackMe website. It is based on the learning content provided in the Common Linux Privesc room.
THM | What the Shell?
Shells and Privilege Escalation | What the Shell? | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Complete Beginner path on the TryHackMe website. It is based on the learning content provided in the What the Shell? room.
THM | Blue
THM | Metasploit: Meterpreter
Windows Exploitation Basics | Metasploit: Meterpreter | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Complete Beginner path on the TryHackMe website. It is based on the learning content provided in the Metasploit: Meterpreter room.
THM | Metasploit: Exploitation
Windows Exploitation Basics | Metasploit: Exploitation | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Complete Beginner path on the TryHackMe website. It is based on the learning content provided in the Metasploit: Exploitation room.
THM | Metasploit: Introduction
Windows Exploitation Basics | Metasploit: Introduction | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Complete Beginner path on the TryHackMe website. It is based on the learning content provided in the Metasploit: Introduction room.
THM | Active Directory Basics
Windows Exploitation Basics | Active Directory Basics | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Complete Beginner path on the TryHackMe website. It is based on the learning content provided in the Active Directory Basics room.
THM | Encryption - Crypto 101
Cryptography | Encryption - Crypto 101 | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Complete Beginner path on the TryHackMe website. It is based on the learning content provided in the Encryption - Crypto 101 room.
THM | John the Ripper: The Basics
Cryptography | John the Ripper: The Basics | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Complete Beginner path on the TryHackMe website. It is based on the learning content provided in the John the Ripper: The Basics room.
THM | Hashing - Crypto 101
Cryptography | Hashing - Crypto 101 | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Complete Beginner path on the TryHackMe website. It is based on the learning content provided in the Hashing - Crypto 101 room.
THM | Pickle Rick
Web Hacking Fundamentals | Pickle Rick | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Complete Beginner path on the TryHackMe website. It is based on the learning content provided in the Pickle Rick room.
THM | Upload Vulnerabilities
Web Hacking Fundamentals | Upload Vulnerabilities | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Complete Beginner path on the TryHackMe website. It is based on the learning content provided in the Upload Vulnerabilities room.
THM | OWASP Juice Shop
Web Hacking Fundamentals | OWASP Juice Shop | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Complete Beginner path on the TryHackMe website. It is based on the learning content provided in the OWASP Juice Shop room.
THM | OWASP Top 10 - 2021
Web Hacking Fundamentals | OWASP Top 10 - 2021 | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Complete Beginner path on the TryHackMe website. It is based on the learning content provided in the OWASP Top 10 - 2021 room.
THM | Burp Suite: The Basics
Web Hacking Fundamentals | Burp Suite: The Basics | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Complete Beginner path on the TryHackMe website. It is based on the learning content provided in the Burp Suite: The Basics room.
THM | Network Services 2
Network Exploitation Basics | Network Services 2 | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Complete Beginner path on the TryHackMe website. It is based on the learning content provided in the Network Services 2 room.
THM | Network Services
Network Exploitation Basics | Network Services | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Complete Beginner path on the TryHackMe website. It is based on the learning content provided in the Network Services room.
THM | Nmap
THM | Introductory Networking
Network Exploitation Basics | Introductory Networking | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Complete Beginner path on the TryHackMe website. It is based on the learning content provided in the Introductory Networking room.
THM | Introductory Researching
Complete Beginner Introduction | Introductory Researching | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Complete Beginner path on the TryHackMe website. It is based on the learning content provided in the Introductory Researching room.
THM | Starting Out In Cyber Sec
Complete Beginner Introduction | Starting Out In Cyber Sec | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Complete Beginner path on the TryHackMe website. It is based on the learning content provided in the Starting Out In Cyber Sec room.
THM | Tutorial
THM | Security Operations
Introduction to Defensive Security | Security Operations | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Introduction to Cyber Security path on the TryHackMe website. It is based on the learning content provided in the Security Operations room.
THM | Intro to Digital Forensics
Introduction to Defensive Security | Intro to Digital Forensics | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Introduction to Cyber Security path on the TryHackMe website. It is based on the learning content provided in the Intro to Digital Forensics room.
THM | Network Security
Introduction to Cyber Security | Network Security | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Introduction to Cyber Security path on the TryHackMe website. It is based on the learning content provided in the Network Security room.
THM | Operating System Security
Introduction to Cyber Security | Operating System Security | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Introduction to Cyber Security path on the TryHackMe website. It is based on the learning content provided in the Operating System Security room.
THM | Web Application Security
Introduction to Cyber Security | Web Application Security | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Introduction to Cyber Security path on the TryHackMe website. It is based on the learning content provided in the Web Application Security room.
THM | Windows Fundamentals 3
Windows Fundamentals | Windows Fundamentals 3 | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Pre Security Path on the TryHackMe website. It is based on the learning content provided in the Windows Fundamentals 3 room.
THM | Windows Fundamentals 2
Windows Fundamentals | Windows Fundamentals 2 | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Pre Security Path on the TryHackMe website. It is based on the learning content provided in the Windows Fundamentals 2 room.
THM | Windows Fundamentals 1
Windows Fundamentals | Windows Fundamentals 1 | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Pre Security Path on the TryHackMe website. It is based on the learning content provided in the Windows Fundamentals 1 room.
THM | Linux Fundamentals Part 3
Linux Fundamentals | Linux Fundamentals Part 3 | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Pre Security Path on the TryHackMe website. It is based on the learning content provided in the Linux Fundamentals Part 3 room.
THM | Linux Fundamentals Part 2
Linux Fundamentals | Linux Fundamentals Part 2 | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Pre Security Path on the TryHackMe website. It is based on the learning content provided in the Linux Fundamentals Part 2 room.
THM | Linux Fundamentals Part 1
Linux Fundamentals | Linux Fundamentals Part 1 | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Pre Security Path on the TryHackMe website. It is based on the learning content provided in the Linux Fundamentals Part 1 room.
THM | Putting it all together
How The Web Works | Putting it all together | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Pre Security Path on the TryHackMe website. It is based on the learning content provided in the Putting it all together room.
THM | How websites work
How The Web Works | How websites work | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Pre Security Path on the TryHackMe website. It is based on the learning content provided in the How websites work room.
THM | HTTP in detail
How The Web Works | HTTP in detail | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Pre Security Path on the TryHackMe website. It is based on the learning content provided in the HTTP in detail room.
THM | DNS in detail
How The Web Works | DNS in detail | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Pre Security Path on the TryHackMe website. It is based on the learning content provided in the DNS in detail room.
THM | Extending Your Network
Network Fundamentals | Extending Your Network | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Pre Security Path on the TryHackMe website. It is based on the learning content provided in the Extending Your Network room.
THM | Packets and Frames
Network Fundamentals | Packets and Frames | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Pre Security Path on the TryHackMe website. It is based on the learning content provided in the Packets & Frames room.
THM | OSI Model
THM | Intro to LAN
Network Fundamentals | Intro to LAN | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Pre Security Path on the TryHackMe website. It is based on the learning content provided in the Intro to LAN room.
THM | What is Networking?
Network Fundamentals | What is Networking? | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Pre Security Path on the TryHackMe website. It is based on the learning content provided in the What is Networking? room.
THM | Careers in Cyber
Introduction to Cyber Security | Careers in Cyber | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Pre Security Path on the TryHackMe website. It is based on the learning content provided in the Careers in Cyber room.
THM | Intro to Defensive Security
Introduction to Cyber Security | Intro to Defensive Security | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Pre Security Path on the TryHackMe website. It is based on the learning content provided in the Intro to Defensive Security room.
THM | Intro to Offensive Security
Introduction to Cyber Security | Intro to Offensive Security | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Pre Security Path on the TryHackMe website. It is based on the learning content provided in the Intro to Offensive Security room.





















