Member-only story

THM - Publisher

5 min readMar 29, 2025

A writeup for the room Publisher on TryHackMe

Test your enumeration skills on this boot-to-root machine.

Footprinting

We can start by scanning the target with nmap.

nmap -sS TARGET_IP

The scan reveals two open ports: 22 (SSH) and 80 (HTTP).

We can try to visit the web server at http://TARGET_IP

The page is a simple blog with a few posts.

There isn’t much to see here and most of the links are dead.

What is the user flag?

Enumerating the web server

If we take a closer look at the site, we can see that there are many references to SPIP, which is a Content Management System (CMS) such as WordPress.

--

--

Francesco Pastore
Francesco Pastore

Written by Francesco Pastore

An engineering student in Milan and a web developer for an IT company. Write about programming and cybersecurity topics.

Responses (1)