Advent of Cyber Prep Track | Tryhackme | Day-0
嗯,用户让我帮忙总结一篇文章,控制在一百个字以内,而且不需要特定的开头。我得先仔细看看这篇文章的内容。 文章是关于TryHackMe的Advent of Cyber 2025活动。看起来这是一个网络安全的挑战活动,用户参加了Prep Track,里面有很多实际操作的练习,比如密码安全、恶意软件检测、命令行操作等等。每个挑战都有具体的步骤和目标,比如创建强密码、扫描可疑文件、使用Linux命令等。 文章还提到通过这些练习,用户学到了攻击和防御的不同视角,以及如何应对现实中的安全威胁。最后还鼓励读者参与活动,并有机会赢取奖金。 所以,总结的时候需要涵盖活动的目的、主要挑战内容以及学习到的实际技能。同时要控制在100字以内,所以要简洁明了。 可能会写成:文章介绍了TryHackMe的Advent of Cyber 2025活动,通过每日挑战和实验室实践,参与者学习了网络安全技能,包括密码安全、恶意软件检测、系统漏洞利用等,并通过解决实际问题加深理解。 这样既涵盖了活动内容,又突出了学习重点。 </think> 文章介绍了TryHackMe的Advent of Cyber 2025活动,参与者通过每日挑战和实验室实践学习网络安全技能,包括密码安全、恶意软件检测、系统漏洞利用等,并通过解决实际问题加深理解。 2026-1-26 09:9:27 Author: infosecwriteups.com(查看原文) 阅读量:0 收藏

Advent of Cyber 2025 | Walkthrough

M o $ t a

Hey my dear readers_ Today, we are solving the TryHackMe Advent of Cyber Prep Track 2025. Advent of Cyber wasn’t just about theory — it was about hands-on learning, every single day. Each challenge pushed me to think like an attacker while also understanding defensive perspectives.

What Advent of Cyber Taught Me

Through daily labs and challenges, I got practical exposure to:

  • Real-world attack scenarios
  • Common vulnerabilities and misconfigurations
  • Blue team vs Red team perspectives
  • How small security mistakes are exploited in practice

Instead of just reading concepts, I was actively solving problems, which made learning stick.

Press enter or click to view image in full size

Find the room here:

Welcome to Advent of Cyber 2025!

In this year’s Advent of Cyber, something isn’t quite right in Wareville. Can you help save the town and their beloved SOC-mas tradition from the evil grasp of King Malhare?

Dive into the wonderful world of cyber security by engaging in festive beginner-friendly challenges every day in the lead-up to Christmas!

Advent of Cyber is available to all TryHackMe users, and best of all, it’s free to participate in. You’ll also be in with the chance of winning from this year’s huge $150,000 prize draw. The more rooms you complete, the higher your chances of winning BIG!

Answer the questions below

Answer: no-answer-needed

Answer the questions below

Answer: no-answer-needed

Press enter or click to view image in full size

Answer the questions below

Answer: no-answer-needed

Press enter or click to view image in full size

Let’s Get Warmed Up

The snow has started falling in Wareville, home of The Best Festival Company (TBFC). The team is preparing for SOCMAS, the annual cyber celebration, but something’s not right. Systems are glitching, passwords are failing, and McSkidy suspects something is afoot. This name keeps coming up: King Malhare. What could it mean?

Before joining the SOCMAS Response Team, you can complete 10 short missions to ensure you are ready. Each one teaches an essential cyber security skill and uncovers clues to help get you ready for Advent of Cyber 2025.

How it Works

To start each challenge, click the “View Site” button in the top-right corner of the task page. You’ll need to press this button again for every new task, as each one loads its own challenge site. Once clicked, the room will open in a split-screen view, letting you follow the instructions on the left while interacting with the challenge on the right. This is where you’ll complete all of our interactive challenges to get you ready for this year’s event!

Answer the questions below

Answer: no-answer-needed

Password Pandemonium

As you log into your new TBFC workstation, an alert pops up:

“Weak passwords detected on 73 TBFC accounts!”

Even McSkidy’s password, P@ssw0rd123 (or set a strong password), has been flagged. Before gaining full access, you’ll need to prove your password prowess.

Strong passwords are one of the simplest yet most effective defences against cyber attacks.

Objective:
Create a password that passes all system checks and isn’t found in the leaked password list.

Steps:

Enter a password with at least 12 characters.

Include uppercase, lowercase, numbers, and symbols.

Ensure it isn’t in the breach database.

Press enter or click to view image in full size

Answer to questions below

What’s the flag?

Answer: THM{StrongStart}

Press enter or click to view image in full size

The Suspicious Chocolate.exe

A shiny USB labelled “SOCMAS Party Playlist” appears on your desk. Inside is a mysterious file called chocolate.exe.
It looks festive, but who sent it?

In this challenge, you’ll scan the file using a simulated VirusTotal tool to decide whether it’s safe or malicious.
Checking suspicious files is a crucial skill for every defender.

Objective:
Determine if chocolate.exe is safe or infected.

Steps:

Click the “Scan” Button.

Review the scan report (49 clean results, 1 malicious).

Decide correctly whether the file is safe or dangerous.

Press enter or click to view image in full size

Answer to questions below

What’s the flag?

Answer: THM{NotSoSweet}

Press enter or click to view image in full size

Welcome to the AttackBox!

You step into TBFC’s AttackBox, a secure virtual environment built for training. The system hums quietly, waiting for your first command.

This is where defenders learn, break, and rebuild safely. Getting comfortable with the command line is your first step toward cyber mastery.

Objective:
Find and read the hidden welcome message inside your AttackBox.

Steps:

Use ls to list files.

Use cd challenges/ to change directories.

Use cat welcome.txt to read the text file.

Press enter or click to view image in full size

Answer the questions below

What’s the flag?

Answer: THM{Ready2Hack}

Press enter or click to view image in full size

The CMD Conundrum

McSkidy’s workstation shows signs of tampering, suspicious files moved, logs wiped, and a strange folder named mystery_data.

It’s time to use the Windows Command Prompt to uncover what’s hidden.
Learning these commands helps you investigate systems and find what the GUI can’t.

Objective:
Find the hidden flag file using Windows commands.

Steps:

Use dir to list visible files.

Try dir /a to reveal hidden ones.

Use type hidden_flag.txt to read the flag.

Press enter or click to view image in full size

Answer the questions below

What’s the flag?

Answer: THM{WhereIsMcSkidy}

Press enter or click to view image in full size

Linux Lore

Get M o $ t a’s stories in your inbox

Join Medium for free to get updates from this writer.

TBFC’s delivery drones are glitching, dropping eggs instead of presents! McSkidy’s last login came from a Linux server, and something in his account might explain why.

Linux powers most servers worldwide, and knowing how to search within it is a must for any defender.

Objective:
Locate McSkidy’s hidden message in his Linux home directory.

Steps:

Use cd /home/mcskidy/ to enter his folder.

Run ls -la to show all files.

Use cat .secret_message to reveal the flag.

Press enter or click to view image in full size

Answer the questions below

What’s the flag?

Answer: THM{TrustNoBunny}

Press enter or click to view image in full size

The Leak in the List

Rumours swirl that TBFC’s data has been leaked. Emails are bouncing, and the staff are panicking.
McSkidy suspects his account might have been part of a breach.

Defenders often use tools like Have I Been Pwned to check for compromised accounts. Early detection can stop an attack from spreading.

Objective:
Check if McSkidy’s email has appeared in a breach.

Steps:

Enter [email protected] into the breach checker.

Review results for each domain.

Identify the one marked “Compromised.”

Press enter or click to view image in full size

Answer the questions below

What’s the flag?

Answer: THM{LeakedAndFound}

Press enter or click to view image in full size

WiFi Woes in Wareville

The TBFC drones are looping endlessly over Wareville Square. Someone logged into the company router using default credentials!

Securing WiFi is critical. Default passwords are like leaving the front gate wide open.

Objective:
Log into the router and secure it with a strong new password.

Steps:

Log in with username admin and password admin.

Go to “Security Settings.”

Set a new strong password that passes validation.

Press enter or click to view image in full size

Answer the questions below

What’s the flag?

Answer: THM{NoMoreDefault}

Press enter or click to view image in full size

The App Trap

McSkidy’s social account has gone rogue, posting strange messages about “EASTMAS.” A suspicious third party app may be behind it.

Learning to review and manage app permissions helps stop data leaks before they start.

Objective:
Find and remove the malicious connected app.

Steps:

Review the list of connected apps.

Look for one with unusual permissions (like “password vault” access).

Click “Revoke Access.”

Press enter or click to view image in full size

Press enter or click to view image in full size

Answer the questions below

What’s the flag?

Answer: THM{AppTrapped}

Press enter or click to view image in full size

The Chatbot Confession

TBFC’s AI assistant, FestiveBot, was meant to help write cheerful emails, but it’s been spilling secrets.
Some messages reveal internal URLs and even passwords.

AI tools can be powerful, but defenders must know how to prevent them from oversharing.

Objective:
Identify which chatbot messages contain sensitive information.

Steps:

Read each line of the conversation.

Select the ones containing private data.

Submit your findings.

Press enter or click to view image in full size

Answer the questions below

What’s the flag?

Answer: THM{DontFeedTheBot}

Press enter or click to view image in full size

The Bunny’s Browser Trail

SOCMAS web servers are showing heavy traffic, but one log entry stands out:

“User Agent: BunnyOS/1.0 (HopSecBot)”

Someone or something has infiltrated the system.
User Agent strings help defenders spot automated or suspicious visitors in network logs.

Objective:
Find the unusual User Agent in the HTTP log.

Steps:

Read the provided web log entries.

Compare them to common browsers (Chrome, Firefox, Edge).

Identify and select the suspicious entry.

Press enter or click to view image in full size

Answer the questions below

What’s the flag?

Answer: THM{EastmasIsComing}

Press enter or click to view image in full size

Consider Yourself Warmed Up!

Well done for making your way through Advent of Cyber 2025’s Prep Track! These mini challenges have been designed to familiarise you with some of the key tricks and tools you’ll need at your disposal to help save SOC-mas in this year’s event. If you’re looking to start your cyber security journey, there’s no better place to do it than with us, as we take you on a tour of topics from Linux CLI to Prompt Injection, getting you up to speed with the world of cyber and all, while earning chances to win some of our amazing prizes in our annual AoC giveaway!

Bring on Advent of Cyber 2025!

Answer the questions below

Answer: no-answer-needed

Press enter or click to view image in full size

Finally_ we get a pop-up congratulation, us that the issue with your room has been solved.

Follow me and Let’s go to next lavel…….

文章来源: https://infosecwriteups.com/advent-of-cyber-prep-track-tryhackme-day0-0dd49d50de37?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh