Basic Pentesting is your first real hacking machine on TryHackMe. This walkthrough covers the complete methodology: scanning, enumeration, exploitation, and privilege escalation. Follow along to root your first box!
Try First!
Attempt the machine yourself before reading this walkthrough. The struggle is where learning happens. Only use this guide when stuck.
Step 1: Reconnaissance
Step 2: Web Enumeration
Username Discovery
Web pages, comments, and files often leak usernames. These can be used for SSH brute forcing or SMB enumeration. Always note names!
Step 3: SMB Enumeration
Step 4: SSH Brute Force
Step 5: Initial Access & Enumeration
Step 6: Privilege Escalation
Complete Attack Path
1
ScanNmap reveals SSH, HTTP, SMB
2
Web EnumFind /development with usernames
3
SMBAnonymous share confirms users
4
Brute ForceHydra finds jan's SSH password
5
Lateral MoveFind kay's SSH key as jan
6
Crack KeyJohn cracks key passphrase
7
RootVim sudo escape to root
Knowledge Check
Key Takeaways
- Always do thorough port scanning - services reveal attack vectors
- Web directories often contain sensitive information
- SMB anonymous shares may leak credentials or usernames
- SSH keys without passwords or with weak passphrases are exploitable
- sudo -l is essential for privilege escalation enumeration