TryHackMe Writeups
Comprehensive writeups of TryHackMe challenges, CTFs, and learning paths. Documenting my journey through cybersecurity challenges and skill development.
Latest Writeups
Directory
Do you have what it takes to crack this case?
Planned Content
Web Application Security
OWASP Top 10, SQL injection, XSS, and web exploitation techniques
Network Security
Network enumeration, port scanning, and service exploitation
Privilege Escalation
Linux and Windows privilege escalation techniques and methodologies
Digital Forensics
Evidence analysis, memory forensics, and incident response
Cryptography
Encryption algorithms, hash cracking, and cryptographic attacks
Reverse Engineering
Binary analysis, malware analysis, and exploitation development
Current Progress
Stay Updated
Connect with me on social media to get notified when new writeups are published!
Writeup Methodology
Each writeup will follow a structured approach to ensure comprehensive learning:
Initial Reconnaissance
Target identification, service enumeration, and information gathering
Vulnerability Assessment
Identifying potential attack vectors and security weaknesses
Exploitation
Step-by-step exploitation process with detailed explanations
Post-Exploitation
Privilege escalation, persistence, and evidence collection
Key Takeaways
Lessons learned, defensive measures, and skill development notes