Detailed walkthroughs for TryHackMe rooms covering Active Directory exploitation, CTF competition challenges, and network-based attack scenarios. Step-by-step with full tool usage and exploitation chains.
High school student from Vietnam passionate about offensive security, binary exploitation, and Active Directory attacks. Member of W4LLZ CTF team.
Full Active Directory attack chain from web enumeration through SMB and LDAP enumeration, Kerberoasting, Constrained Delegation abuse, and Secrets Dump to achieve Domain Admin on a TryHackMe AD lab environment.
Cyber Competition Team 2019 multi-category CTF room on TryHackMe. Walkthroughs for Forensics, Reverse Engineering, PCAP analysis, and Cryptography challenges with detailed methodology and tool usage.
File analysis and metadata extraction challenge. Examining file headers, embedded data, and hidden information within a forensic artifact to recover the flag.
Network packet capture analysis challenge. Filtering and inspecting PCAP data to extract credentials, conversations, and hidden data from network traffic.
Binary reverse engineering challenge. Analyzing compiled code, tracing program logic, and extracting the flag through static and dynamic analysis techniques.
Classical cryptography challenge. Identifying and breaking a cipher through frequency analysis, pattern recognition, and cryptographic technique application.