TryHackMe: Investigating Windows 2.0

We're back today with a walkthrough for the second room in the Investigating Windows series. Later this week, we will post the Investigating Windows 3.x room so that you can get that shiny TryHackMe Badge. Introduction The room's instruction are as follows: Note: In order to answer the questions in this challenge you should have … Continue reading TryHackMe: Investigating Windows 2.0

TryHackMe: Investigating Windows, Part 1

This is the first part of the Investigating Windows series on TryHackMe. Completion of this room as well as parts 2 and 3 reward you with a badge. Over the next few days and starting today, I will be releasing walkthroughs for each part of the Investigating Windows series. I hope these posts provide guidance … Continue reading TryHackMe: Investigating Windows, Part 1

THM Walkthrough: OWASP Top 10 #2: Broken Authentication

Just like the second entry into the OWASP Top 10 vulnerabilities for broken authentication, the walkthrough for this one is also going to be short and sweet. Recall from the overview article, broken authentication is really just that: the mechanisms used to authenticate a user and allow them into the site are broken. This allows … Continue reading THM Walkthrough: OWASP Top 10 #2: Broken Authentication

THM: OWASP Top 10 Severity 1/Injection Walkthrough

Continuing with our OWASP series we start here with the TryHackMe OWASP Top 10 Severity 1 Injection task. If you haven't yet, check out the Injection overview written up for HTH. In this example, the sample site set up by THM is vulnerable to some sort of injection attack. When we open the site up, … Continue reading THM: OWASP Top 10 Severity 1/Injection Walkthrough