During my journey to finish the Offensive Pentesting path on TryHackMe, I had to hack the several machines. This walkthrough is for Daily Bugle, a Linux based machine.

All flags and hashes will be redacted in order to prevent an easy win of the room. You can find the room here.

Enumeration

Let’s start with a full Nmap scan and a check on the main site:


During my journey to finish the Offensive Pentesting path on TryHackMe, I had to hack the several machines. This walkthrough is for Mr Robot CTF, a Linux based machine.

All flags and hashes will be redacted in order to prevent an easy win of the room. You can find the room here.

Enumeration

Let’s start with a basic Nmap scan and a check on the main site:


During my journey to finish the Offensive Pentesting path on TryHackMe, I had to hack the several machines. This walkthrough is for Skynet, a Linux based machine.

All flags and hashes will be redacted in order to prevent an easy win of the room. You can find the room here.

Enumeration

Let’s start with a basic Nmap scan and a Gobuster search:


During my journey to finish the Offensive Pentesting path on TryHackMe, I had to hack the several machines. This walkthrough is for Retro, a Windows based machine.

All flags and hashes will be redacted in order to prevent an easy win of the room. You can find the room here.

Enumeration

We get a warning right in the description of the task stating that the machine doesn’t respond to ICMP requests. Taking that into consideration, let’s start by running our nmap on our target with the flag -Pn:


Recently I’ve managed to adquire a couple of Raspberry Pi’s in order to assemble some new gadgets for my Offensive Security tools. And since I’ve been practicing a lot on TryHackMe for these past few months, I though it would be good to have a portable hacking machine, that I could use on the go, for those times where I can’t have my laptop with me.

TryHackMe on Raspberry Pi 4 from Ipad Pro

My setup consists of the following Software and Hardware

  • iPad Pro (128Gb, with LTE)
  • Raspberry Pi 4 (4Gb Ram)
  • Sandisk 64 Gb SD Card
  • A USB-C cable to connect the Raspberry Pi 4 to…


I love all kinds of HID attack devices: Rubber Ducky or Bash Bunny from Hak5, DigiSpark from Arduino, O.MG cables and more. But my latest discovery had me getting a Raspberry PI Zero W with P4wnP1 framework installed, to turn it into an all around attack device capable of some interesting things.

Raspberry Pi Zero W and USB Expansion dongle from MakerFun

Looking at the device, I decided not to cover it in a case, since the USB dongle expansion already covers the bottom part of the Pi (with Blue Leds when connected) but it is entirely possible to make a 3D printed case for it (as seen in other…

Fábio Mestre

Pentester, CyberSecurity Enthusiast, Software Engineer, enjoys everything related to hacking, programming and cybersecurity.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store