112 words
1 minute
Light

THM

image 1. image

Using NMAP image

Port 22 (SSH) open among the first 1000 scanned ports image

Using SQL Injection image

When we enter a username, a “password” is returned. This suggests that the system is likely using a query such as:

SELECT * FROM usuario WHERE username = 'smokey'

This makes it possible to use UNION-based SQL injection, allowing us to query a default database table from SQLite that stores database metadata.

Now that we have the table name, let’s test it

How many records does this table contain? (2)

  • image

Now attempting to read the discovered records

  • image

Since there are two records, we can apply the following approach:

  • image

With the usernames obtained, we can now retrieve the passwords

TryHackMeAdmin – Password

  • image

flag – Password

  • image
Light
Author
KDCroce
Published at
2025-07-02
License
CC BY-NC-SA 4.0