đŸš©
THM Walkthroughs
  • THM Walkthroughs
    • đŸ§‘â€đŸ«Tutorial
  • 🟩Difficulty: Info
    • 🔌What is Networking?
    • 🔌Intro to LAN
    • 🐧Linux Fundamentals
      • 🐧Linux Fundamentals Part 1
        • Task 2 - A Bit of Background on Linux
        • Task 4 - Running Your First few Commands
        • Task 5 - Interacting With the Filesystem!
        • Task 6 - Searching for Files
        • Task 7 - An Introduction to Shell Operators
      • 🐧Linux Fundamentals Part 2
        • Task 3 - Introduction to Flags and Switches
        • Task 4 - Filesystem Interaction Continued
        • Task 5 - Permissions 101
        • Task 6 - Common Directories
      • 🐧Linux Fundamentals Part 3
        • Task 3 - Terminal Text Editors
        • Task 4 - General/Useful Utilities
        • Task 5 - Processes 101
        • Task 6 - Maintaining Your System: Automation
        • Task 8 - Maintaining Your System: Logs
    • đŸȘŸWindows Fundamentals
      • đŸȘŸWindows Fundamentals 1
      • đŸȘŸWindows Fundamentals 2
      • đŸȘŸWindows Fundamentals 3
    • 🔓Principles of Security
    • 🐍Python Basics
    • 🔍History of Malware
    • đŸŠčCommon Attacks
    • đŸ–„ïžSecurity Awareness
    • ⚔Intro to Offensive Security
    • đŸŠčPentesting Fundamentals
    • 🔓CVE Walkthroughs
      • đŸ–„ïžSudo Security Bypass: CVE-2019-14287
      • đŸ–„ïžSudo Buffer Overflow: CVE-2019-18634
      • đŸ–„ïžBaron Samedit: CVE-2021-3156
      • đŸ–„ïžOverlayFS: CVE-2021-3493
      • đŸ–„ïžPolkit: CVE-2021-3560
      • đŸ–„ïžPwnkit: CVE-2021-4034
      • đŸȘ¶Apache HTTP Server Path Traversal: CVE-2021-41773/42013
      • đŸ§»Dirty Pipe: CVE-2022-0847
      • 🟱Spring4Shell: CVE-2022-22965
    • 🟧Burp Suite
      • 🟧Burp Suite: The Basics
      • 🟧Burp Suite: Repeater
    • 🏁Challenges
      • ‎Bypass Disable Functions
    • đŸŽŸïžTHM PROMOs
      • đŸŽŸïžLearn and win prizes [PROMO ENDED]
      • đŸŽŸïžLearn and win prizes #2 [PROMO ENDED]
  • đŸŸ©Difficulty: Easy
    • 🚀Learning Cyber Security
    • 🔁The Hacker Methodology
    • 🔍Google Dorking
      • Task 2 - Let's Learn About Crawlers
      • Task 4 - Beepboop - Robots.txt
      • Task 5 - Sitemaps
      • Task 6 - What is Google Dorking?
    • 🐝OWASP Top 10
      • Task 5 - Command Injection Practical
      • Task 7 - Broken Authentication Practical
      • Task 11 - Sensitive Data Exposure (Challenge)
      • Task 13 - XML External Entity - eXtensible Markup Language
      • Task 14 - XML External Entity - DTD
      • Task 16 - XML External Entity - Exploiting
      • Task 18 - Broken Access Control (IDOR Challenge)
      • Task 19 - Security Misconfiguration
      • Task 20 - Cross-site Scripting
      • Task 21 - Insecure Deserialization
      • Task 24 - Insecure Deserialization - Cookies
      • Task 25 - Insecure Deserialization - Cookies Practical
      • Task 30 - Insufficient Logging and Monitoring
    • 📡Nmap
      • Task 2 - Introduction
      • Task 3 - Nmap Switches
      • Task 5 - TCP Connect Scans
      • Task 6 - Scan Types SYN Scans
      • Task 7 - UDP Scans
      • Task 8 - NULL, FIN and Xmas
      • Task 9 - ICMP Network Scanning
      • Task 10 - NSE Scripts Overview
      • Task 11 - Working with the NSE
      • Task 12 - Searching for Scripts
      • Task 13 - Firewall Evasion
      • Task 14 - Practical
    • 📡RustScan
      • Task 2 - Installing RustScan
      • Task 5 - Extensible
      • Task 7 - Scanning Time!
      • Task 8 - RustScan Quiz
    • 🐙Crack the hash
    • 🌍OhSINT
    • 🧑‍🚀Vulnversity
    • 🧊Ice
    • đŸȘŸBlue
    • 🎄Advent of Cyber 4 (2022)
  • 🟹Difficulty: Medium
    • đŸȘŸAttacktive Directory
      • Task 3 - Welcome to Attacktive Directory
      • Task 4 - Enumerating Users via Kerberos
      • Task 5 - Abusing Kerberos
      • Task 6 - Back to the Basics
      • Task 7 - Elevating Privileges within the Domain
      • Task 8 - Flag Submission Panel
    • 💀Mr Robot CTF
    • 🛗Linux PrivEsc
    • 🛗Linux PrivEsc Arena [WIP]
    • 🛗Windows PrivEsc Arena
  • 🟧Difficulty: Hard
    • 🐘Hacking Hadoop [WIP]
  • đŸŸ„Difficulty: Insane
    • â›șYou're in a cave [WIP]
  • Blank Room (Duplicate Me)
Powered by GitBook
On this page
  • Task 1 - Information Introduction
  • Let's get started!
  • Task 2 - Common Attacks Social Engineering
  • Read the task information and watch the attached videos
  • What was the original target of Stuxnet?
  • Task 3 - Common Attacks Social Engineering: Phishing
  • Click the green "View Site" button at the top of this task if you haven't already done so.
  • What is the flag?
  • Task 4 - Common Attacks Malware and Ransomware
  • [Research] What currency did the Wannacry attackers request payment in?
  • Task 5 - Common Attacks Passwords and Authentication
  • Click the green button at the start of the task to deploy the interactive hash brute-forcer!
  • Copy the list of passwords into the "Password List" field of the hash cracker, then click "Go"!
  • What is the password?
  • In the next task we will look at some of the common account protection measures, as well as how to generate secure passwords.
  • Task 6 - Staying Safe Multi-Factor Authentication and Password Managers
  • Where you have the option, which should you use as a second authentication factor between SMS based TOTPs or Authenticator App based TOTPs (SMS or App)?
  • Task 7 - Staying Safe Public Network Safety
  • Deploy the interactive content by clicking the green button at the top of the task.
  • The interactive content for this task demonstrates what can happen if information is sent over a potentially unsafe network with various types of encryption (or lack thereof). There is no flag for this task, but you are encouraged to try each of the different scenarios, mixing and matching the options provided in the control box at the bottom right of the screen.
  • Task 8 - Staying Safe Backups
  • What is the minimum number of up-to-date backups you should make?
  • Of these, how many (at minimum) should be stored in another location?
  • Task 9 - Staying Safe Updates and Patches
  • (Optional) Complete the Blue room on TryHackMe to see the brutal effects of the Eternal Blue exploit in action against an unpatched machine for yourself!
  • Task 10 - Information Conclusion
  • I have completed the Common Attacks room!
  1. Difficulty: Info

Common Attacks

With practical exercises see how common attacks occur, and improve your cyber hygiene to stay safer online.

PreviousHistory of MalwareNextSecurity Awareness

Last updated 2 years ago

Room Attributes
Value

Subscription Required

False [Free]

Type

Walkthrough

Difficulty

Info

Tags

Common Attacks, Security Awareness, Basics, Internet Safety

Task 1 - Information Introduction

Let's get started!

No answer needed

Task 2 - Common Attacks Social Engineering

Read the task information and watch the attached videos

No answer needed

What was the original target of Stuxnet?

HINT: Check the case study in the task

Task 3 - Common Attacks Social Engineering: Phishing

Click the green "View Site" button at the top of this task if you haven't already done so.

No answer needed

What is the flag?

Task 4 - Common Attacks Malware and Ransomware

[Research] What currency did the Wannacry attackers request payment in?

Task 5 - Common Attacks Passwords and Authentication

Click the green button at the start of the task to deploy the interactive hash brute-forcer!

No answer needed

Copy the list of passwords into the "Password List" field of the hash cracker, then click "Go"!

No answer needed

What is the password?

In the next task we will look at some of the common account protection measures, as well as how to generate secure passwords.

No answer needed

Task 6 - Staying Safe Multi-Factor Authentication and Password Managers

Where you have the option, which should you use as a second authentication factor between SMS based TOTPs or Authenticator App based TOTPs (SMS or App)?

Task 7 - Staying Safe Public Network Safety

Deploy the interactive content by clicking the green button at the top of the task.

No answer needed

The interactive content for this task demonstrates what can happen if information is sent over a potentially unsafe network with various types of encryption (or lack thereof). There is no flag for this task, but you are encouraged to try each of the different scenarios, mixing and matching the options provided in the control box at the bottom right of the screen.

No answer needed

Task 8 - Staying Safe Backups

What is the minimum number of up-to-date backups you should make?

Of these, how many (at minimum) should be stored in another location?

Task 9 - Staying Safe Updates and Patches

No answer needed

Task 10 - Information Conclusion

I have completed the Common Attacks room!

No answer needed

Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag

(Optional) Complete the room on TryHackMe to see the brutal effects of the Eternal Blue exploit in action against an unpatched machine for yourself!

The Iran Nuclear Programme

THM{I_CAUGHT_ALL_THE_PHISH}

Bitcoin

TryHackMe123!

App

3

1

🟩
đŸŠč
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
Blue
TryHackMe | Common AttacksTryHackMe
https://tryhackme.com/room/commonattacks
Logo