Documented solutions, methodology breakdowns, and lessons learned from TryHackMe rooms — focused on understanding the why behind each technique.
WEB-INF/web.xml, pivot through
leaked SSH credentials, then turn
sudo zip into a root command
execution primitive.
scanf format strings,
strcmp control flow, and
.rodata resolution without ever running the binary.
wget binary to exfiltrate
root-owned files via HTTP POST body injection.
bash -c,
read server-side Go source to confirm the vulnerability, and extract
the flag from an environment variable.
private
storage slots directly via eth_getStorageAt
JSON-RPC — no wallet, no transaction — and recover the flag that was
never meant to leave the chain.
profile.php?user=guest, then
exploit an IDOR by swapping the user reference to
admin while reusing the same session.