Lab/Room TryHackMe - Pentester
Type Challenge
Statut Done
Date 07/03/2026

Context

Learn about active recon, web app attacks and privilege escalation.

Starting hypothesis

Teaching how to use the basic recon tools, shell access and priv escalation.

Method / Used Tools

Nmap

Nmap is a network scanning tool widely used in cybersecurity, system administration, and penetration testing to discover hosts, identify open ports, and enumerate services running on a target machine. During the reconnaissance phase of a security assessment, Nmap helps map the attack surface by revealing which services are accessible and potentially vulnerable.

A typical Nmap scan works by sending specially crafted packets to a target host and analyzing the responses. From these responses, Nmap can determine whether ports are open, closed, or filtered, and in many cases identify the service and its version.

Several flags allow the scanner to adjust the depth and behavior of the scan:

Nmap also provides operating system detection using the -O flag. This feature analyzes network characteristics such as TCP/IP stack behavior and packet responses to infer the likely operating system running on the target host.

In practice, penetration testers often combine multiple flags in a single command to perform efficient enumeration. For example, combining service detection, default scripts, and verbose output allows the tester to quickly gather detailed information about the target system while monitoring the scan progress.