Skip to content

OumaPeterOdhiambo911/tryhackme-blue-security-assessment

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 

Repository files navigation

Penetration Test Report: TryHackMe "Blue"

The target of this assessment was "Blue," a specific, vulnerable-by-design virtual machine hosted on the TryHackMe platform.

All findings are from a retired, intentionally vulnerable machine created for security training and skill demonstration.

  • Platform: TryHackMe (https)://tryhackme.com)
  • Room: Blue
  • Purpose: To demonstrate penetration testing methodology, from reconnaissance and exploitation to professional documentation.

Project Overview

This project documents a simulated penetration test against the TryHackMe "Blue" room. The objective was to gain privileged access to the machine by identifying and exploiting its vulnerabilities.

Methodology

The assessment followed a standard penetration testing methodology:

  1. Reconnaissance: Enumerating the target system to identify its operating system, open ports, and running services.
  2. Scanning & Enumeration: Using vulnerability-specific scripts to confirm the presence of known weaknesses.
  3. Exploitation: Using a known exploit to gain initial access and escalate privileges.
  4. Reporting: Documenting all findings, providing a risk rating, and detailing remediation steps.

Tools Used

  • Nmap: For port scanning and service/OS enumeration.
  • Nmap Scripting Engine (NSE): To scan for the specific MS17-010 vulnerability.
  • Metasploit Framework: To manage the exploitation and post-exploitation process.

Report

The full, detailed findings and remediation recommendations are available in the main report file:

➡️ View the Full Penetration Test Report (REPORT.md)

About

A professional pentesting report sample for the TryHackMe "Blue" training lab.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors