Join this room to learn about the first forms of malware and how they turned into the malicious code we see today.

Task 1 Introduction

This room is dedicated to the first types of malware. “Malware” consists of two words combined; malicious and software. Typically, Malware is designed to cause damage to Computers or Networks, this may be on a very large scale or only on a local network (LAN).

This will teach you a small backstory on how malicious software (malware) has evolved into the complicated viruses you may be exposed to today.

All answers to the questions can be found in…


Learn all the different techniques used to backdoor a linux machine!

=>Task 1 Introduction<=

Hey everyone!

This room is dedicated for learning common Linux backdoors techniques! A backdoor is simply something we can do to ensure our consistent access to the machine.

So even if the machine is rebooted, shut down or whatever, we would still be able to have access to it.

These aren’t actual vulnerabilities but just ways to maintain your access on a target :)

To recreate all the backdoor techniques shown in this room, you could simply try them all on your own machine or use the “THM ATTACK…


Get a short introduction to a few of the security topics you’ll be learning about.

Task 1 Web Application Security

Why understanding how the web works is important

To attack web applications, you need to understand how they work. Hacking websites isn’t some magical process but does come down to knowing how a part of a website functions and being able to identify weaknesses to take advantage of. Once you have a good understanding of the fundamentals, you’ll learn about the techniques and tools used in hacking sites.

If something is vulnerable, it means there is the possibility of it being attacked or harmed. If…


Exploit a recent vulnerability and hack Webmin, a web-based system configuration tool.

Task 1 Embark

Enumerate and root the box attached to this task. Can you discover the source of the disruption and leverage it to take control?


Learn how to use a TryHackMe room to start your upskilling in cyber security.

Task 1 What are rooms?

Think of a room like a virtual classroom that teaches a security topic.

You’ll use a mixture of guides and challenges to upskill in different areas cyber security.

Answer the questions below

Q. Rooms include questions that award you points, use the leaderboards to see where you rank against other fellow hackers.

Ans: No Ans Needed

Task 2 Deploy your first machine

Some tasks will have you learning by doing, often through hacking a virtual machine.

Accessing machines through your browser

Control a free machine in your browser to access other machines…


Learn about (and get hands on with) printer hacking and understand the basics of IPP.

Task 1 Unit 1 — Introduction

In this room, we will look at the most common printer hacking techniques and will look at why they’re made vulnerable.

Mass printer hacking has been taking advantage of over the past few years. One example would be when one attacker hacked around 50,000 printers, printing out messages asking people to subscribe to PewDiePie. In the next task we’ll take a look at the reasons behind the success of this attack.


A beginner friendly walkthrough for internet of things (IoT) pentesting.

Task 1 Foreword

Hey everyone,

I’ve been lately intrigued by IoT security so I started looking into it.

I might also release other rooms later related to this subject.

Deploy the machine. It shouldn’t take more than 2–3 minutes to fully boot.

Answer the questions below

Q. Deploy the machine

Ans: No Ans Needed

Task 2 A little theory

What is firmware?

A firmware is a small piece of software that makes hardware work and do what its manufacturer intended it to do. …


Become familiar with cryptography

Task 1 Intro

Cryptography is a big topic. We are going to cover the basics, to give you a basic understanding.

It is used by a wide range of applications, almost everywhere in the internet.

Why we need cryptography?

Without encryption communications over the internet will be very insecure, and it would be very easy for someone to see your data. Fortunately this isn’t true, and almost all of the data you get/send over the internet is encrypted and cannot be seen in plain text by someone who got access to it. …


Learn about how you request content from a web server using the HTTP protocol

Task 1 What is HTTP(S)?

What is HTTP? (HyperText Transfer Protocol)

HTTP is what’s used whenever you view a website, developed by Tim Berners-Lee and his team between 1989–1991. HTTP is the set of rules used for communicating with web servers for the transmitting of webpage data, whether that is HTML, Images, Videos, etc.

What is HTTPS? (HyperText Transfer Protocol Secure)

HTTPS is the secure version of HTTP. HTTPS data is encrypted so it not only stops people from seeing the data you are receiving and sending, but it also gives…


Learn about some of the technologies and designs that power private networks

Task 1 Introducing LAN Topologies

Local Area Network (LAN) Topologies

Over the years, there has been experimentation and implementation of various network designs. In reference to networking, when we refer to the term “topology”, we are actually referring to the design or look of the network at hand. Let’s discuss the advantages and disadvantages of these topologies below.

Star Topology

The main premise of a star topology is that devices are individually connected via a central networking device such as a switch or hub. …

shadowmaster

Student Of Sarath G. I am a Cyber Security Trainer & Ethical Hacker. Thanks to My Guru.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store