CTF Writeups

0xb0rn3@tryhackme:~$ cat completed_rooms.txt

8 rooms pwned
TryHackMe Medium

VulnNet: Internal

Service-chaining across SMB, NFS, Redis, Rsync, and TeamCity CI/CD. Credential pivoting from NFS config leaks to Redis keystore to rsync SSH key injection. Final privesc via TeamCity build RCE as root. 4 flags captured.

THM{e8996faea46df09dba5676dd271c60bd}
Credential Chain TeamCity RCE SSH Injection Medium
Read Writeup
TryHackMe Easy

Pickle Rick

Credentials leaked in HTML comments and robots.txt, leading to a command execution panel with a blacklisted cat trivially bypassed with less. www-data has NOPASSWD sudo ALL — instant root. 3 ingredients found.

Command Injection Sudo Abuse Web Exploit Easy
Read Writeup
TryHackMe Easy

Simple CTF

FTP anonymous intel leak reveals weak reused password. Time-based blind SQLi (CVE-2019-9053) in CMS Made Simple 2.2.8 extracts salted MD5 hash. Cracked creds give SSH access. Privilege escalation via vim sudo NOPASSWD — GTFOBins one-liner to root.

CVE-2019-9053 Blind SQLi vim PrivEsc Easy
Read Writeup
TryHackMe Easy

Bounty Hacker

Anonymous FTP leaks a username and custom password wordlist. Hydra brute-forces SSH in 10 attempts. Sudo /bin/tar with GTFOBins checkpoint callback gives instant root.

THM{80UN7Y_h4cK3r}
SSH Brute-Force GTFOBins tar FTP Enum Easy
Read Writeup
TryHackMe Easy

W1seGuy

Weak XOR encryption with a 5-byte repeating key. Known-plaintext attack using the THM{...} flag format recovers all key bytes with zero brute-force. 2 flags captured.

THM{BrUt3_ForC1nG_XOR_cAn_B3_FuN_nO?}
Cryptography XOR Attack Known-Plaintext Easy
Read Writeup
TryHackMe Easy

Agent Sudo

User-Agent header fuzzing reveals agent identity. FTP brute-force, steganography chain (ZIP → Base64 → steghide) extracts SSH creds. CVE-2019-14287 sudo !root bypass gives instant root.

root flag
CVE-2019-14287 Steganography User-Agent Abuse Easy
Read Writeup
February 2026 TryHackMe

Hidden Deep Into My Heart

Valentine's Day themed Flask app — robots.txt credential leak exposes a hidden vault path and plaintext password. Directory brute-force via Gobuster reveals an admin panel. Credential stuffing captures the flag.

THM{l0v3_is_in_th3_r0b0ts_txt}
Info Disclosure Credential Leak Dir Bruteforce Easy
Read Writeup
February 2026 TryHackMe

RootMe — Full Exploitation Chain

Complete walkthrough from recon to root: File upload filter bypass with .php5 extension + Python SUID privilege escalation. Includes automation script.

File Upload SUID Privesc Web Shell Easy
Read Writeup