
Below are the solutions of the machines I have solved.
There are currently 68 CTFs here.

Challenge showcasing a web app and simple privilege escalation. Can you find the glitch?
More
This is a machine that allows you to practise web app hacking and privilege escalation using recent vulnerabilities.
More
Help Cage bring back his acting career and investigate the nefarious goings on of his agent!
More
Check out our new cloud service, Authentication Anywhere. Can you find other user's secrets?
More
Identify recent vulnerabilities to try exploit the system or read files that you should not have access to.
More
This is a machine that allows you to practise web app hacking and privilege escalation
More
This room is aimed for beginner level hackers but anyone can try to hack this box.
More
You talked a big game about being the most elite hacker in the solar system. Prove it and claim your right to the status of Elite Bounty Hacker!
More
You found a secret server located under the deep sea. Your task is to hack inside the server and reveal the truth.
More
Cracking hashes challenges. This is a free room, which means anyone can deploy virtual machines in the room.
More
Find out what happened by analysing a .pcap file and hack your way back into the machine
More
Learn about, then enumerate and exploit a variety of network services and misconfigurations.
More
Learn the various ways of discovering hidden or private content on a webserver that could lead to new vulnerabilities
More
Learn how to defeat logins and other authentication mechanisms to allow you access to unpermitted areas
More
Get a short introduction to a few of the security topics you'll be learning about
More
Learn the various ways of discovering subdomains to expand your attack surface of a target
More
Learn how to find and exploit IDOR vulnerabilities in a web application giving you access to data that you shouldn't have
More
Begin learning the fundamentals of computer networking in this bite-sized and interactive module
More
Learn about the fundamental networking framework that determines the various stages in which data is handled across a network
More
Understand how data is divided into smaller pieces and transmitted across a network to another device
More
Learn about some of the technologies used to extend networks out onto the Internet and the motivations for this
More
Learn how all the individual components of the web work together to bring you access to your favourite web sites.
More
In part 1 of the Windows Fundamentals module, we'll start our journey learning about the Windows desktop, the NTFS file system, UAC, the Control Panel, and more..
More
In part 2 of the Windows Fundamentals module, discover more about System Configuration, UAC Settings, Resource Monitoring, the Windows Registry and more..
More
In part 3 of the Windows Fundamentals module, learn about the built-in Microsoft tools that help keep the device secure, such as Windows Updates, Windows Security, BitLocker, and more...
More
Learn about the different career paths in Cyber Security and how TryHackMe can help!
More
Learn about the essential tools for passive reconnaissance, such as whois, nslookup, and dig.
More
Learn how to use simple tools such as traceroute, ping, telnet, and a web browser to gather information.
More