Member-only story
THM - Publisher
5 min readMar 29, 2025
A writeup for the room Publisher on TryHackMe
Test your enumeration skills on this boot-to-root machine.
Footprinting
We can start by scanning the target with nmap.
nmap -sS TARGET_IP
The scan reveals two open ports: 22 (SSH) and 80 (HTTP).
We can try to visit the web server at http://TARGET_IP
The page is a simple blog with a few posts.
There isn’t much to see here and most of the links are dead.
What is the user flag?
Enumerating the web server
If we take a closer look at the site, we can see that there are many references to SPIP, which is a Content Management System (CMS) such as WordPress.