TryHackMe: Complete Beginner

author: Nathan Acks
date: 2021-10-21

Blue

Recon

The --script vuln flag can be used with nmap to detect many (potential) vulnerabilities.

Note that if you use a Metasploit payload module and then switch to an exploit module, the exploit will pick up on the configured payload. You can also set a payload directly with set PAYLOAD.

Find Flags!

The Windows system root is symbolically represented as %SYSTEMROOT%; it’s normally C:/Windows. (But it turns out that for the first flag, TryHackMe actually means C:/.)

The Windows SAM database (passwords) is stored in %SYSTEMROOT%/System32/config. Note that Meterpreter is case-sensitive, event though the Windows filesystem is not!