ai
-
Yo everyone, back with another write-up, I started with an Nmap scan and found ports 22, 80, and FTP open. FTP took a long time to respond. After visiting the web page, I checked the Apache default page and it mentioned adding team.thm to the hosts file. I added it, then ran Gobuster on the domain to…
-
Yo, back with another write-up. This one was very easy and took me around 25 minutes to complete, so let’s get started. I began with an Nmap scan, which showed that ports 22 (SSH) and 80 (HTTP) were open. Since a web service was running, the next logical step was enumeration. After that, I used…
-
Yo, Back with another writeup! Today, we’ll try to complete the Unstable Twin room. We start with an Nmap scan: nmap -sS -sV <IP> The scan shows that ports 22 (SSH) and 80 (HTTP) are open. What is the build number of Vincent’s server? Answer: 1.3.4-dev To find this, you can use Burp Suite: To get…
-
Yo, Back with another writeup, This one is easy, but only if you automate it. You are given usernames.txt and passwords.txt, and you need to test all the combinations. Once you do that, you’ll be able to log in and retrieve the flag from the website. Manually testing a large number of usernames and passwords…
-
In November 2025, Anthropic, the company behind the AI model Claude revealed something the cybersecurity world knew was coming one day, but hoped would be far in the future:A state-sponsored hacking group used an AI system to carry out a major cyberattack with very little human involvement. This isn’t just “AI helped hackers.”It’s the first…
-
Alham Rizvi “A clear understanding of the five most dangerous offensive cyber attacks that dominate today’s threat landscape. You will learn how each attack works conceptually, why it poses serious risks, and where it has been seen in real-world incidents. The content will also highlight common attacker techniques, defensive challenges, andeffective mitigation strategies. By the…
-
{Task 1} Introduction In this room, we will examine application security (AppSec) and incident response (IR). More specifically, we will learn how shifts in threat landscapes, software architecture, and attacker behaviour have made AppSec IR, an intersection of these two practices, increasingly relevant and teach the basics of this hybrid function. Learning Prerequisites While this room has…
-
Recap Before diving in, let’s quickly recap the concepts we’ll explore in this room: Sessions and tokens. Authentication & Authorisation Authentication is the process of verifying your identity (are you J. Doe?). In contrast, authorisation determines what actions an identity can perform in a given resource (what can J. Doe do?). Sessions When you authenticate…
-
{Task 1} Introduction In this room, we’ll dive into different session types and how to investigate several log types at the application level to identify compromise. Learning Prerequisites Before diving into this room, it is recommended to complete the rooms below for better comprehension: Learning Objectives {Task 2} Recap: Session & JWT Recap Before diving in, let’s…
-
Task 1 Introduction Malware refers to software or code created to damage systems, steal information, or allow unauthorised access. It appears in many forms, each with different tactics and goals. Malware can affect businesses in many ways, from financial loss and stolen data to disrupted services and reputational damage. Knowing how malware works is one of…
