LIVE NEWSROOM · --:-- · May 15, 2026
A LIBRARY FOR SECURITY RESEARCHERS

TryHackMe Walkthrough: Net Sec Challenge

Post on X LinkedIn
TryHackMe Walkthrough: Net Sec Challenge

Use this Net Sec challenge to test your mastery of the skills you have acquired in the Network Security module. All the questions in this challenge can be solved using only nmaptelnet, and hydra.

Room Link: Net Sec Challenge

Launch the AttackBox and the target VM.

// 01 Task 2 Challenge Questions Net Sec Challenge

You can answer the following questions using Nmap, Telnet, and Hydra.

Question: What is the highest port number, being open less than 10,000?

here we need to find the open port under 10,000, so for scanning open port we will use nmap with a specific port range.

nmap -p 1-10000 10.10.155.229 -T5

# -T5 refer the speed for scanning the given server
TryHackMe Walkthrough: Net Sec Challenge

here we got the open port details and our desired port is, 8080

Answer: 8080

Question: There is an open port outside the common 1000 ports; it is above 10,000. What is it?

we will again use Nmap for scanning the open ports but his time we will scan all ports above 10,000 so

nmap -p 10000-65000 10.10.155.229 -T5
TryHackMe Walkthrough: Net Sec Challenge 1

Answer: 10021

Question: How many TCP ports are open?

Using Nmap we can find open TCP ports by -sT scan technique

nmap -sT 10.10.155.229 -T5 -p-
TryHackMe Walkthrough: Net Sec Challenge 2

Answer: 6

Question: What is the flag hidden in the HTTP server header?

for getting the flag from http server header, we will use telnet to fetch it. so first we need to connect to port 80 using telnet.

telnet 10.10.155.229 80


GET / HTTP/1.1
Host: telnet.com
TryHackMe Walkthrough: Net Sec Challenge 3

Answer: THM{web_server_25352}

Question: What is the flag hidden in the SSH server header?

for fetching the flag from ssh server header we again use telnet with the following command

telnet 10.10.155.229 22
TryHackMe Walkthrough: Net Sec Challenge 4

Answer: THM{946219583339}

Question: We have an FTP server listening on a nonstandard port. What is the version of the FTP server?

use nmap advance command for finding the FTP server details

nmap -p- -A -T5 10.10.155.229

Answer: vsftpd 3.0.3

Question: We learned two usernames using social engineering: eddie and quinn. What is the flag hidden in one of these two account files and accessible via FTP?

we need to brute these two username for getting the password for each we can use hydra tool for this

  1. create username txt file using cat
  2. cat > user.txt
    eddie
    quinn
  3. now use hydra to brute force the password
hydra -L user.txt -P /usr/share/wordlists/rockyou.txt ftp://10.10.155.229:10021 -v

you wil get the password as eddie -> jordan and quinn -> andrea

now login to the FTP server using these details, and you’ll get the flag, after getting the flag file download it to your machine by using GET command and then read it

Answer: THM{321452667098}

Question: Browsing to http://10.10.155.229:8080 displays a small challenge that will give you a flag once you solve it. What is the flag?

we need scan the server without detected by the IDS system, for that we will use -sN null scan technique in nmap.

nmap -sN 10.10.155.229
TryHackMe Walkthrough: Net Sec Challenge 5

Answer: THM{f7443f99}

Net Sec Challenge Net Sec Challenge Net Sec Challenge Net Sec Challenge Net Sec Challenge Net Sec Challenge Net Sec Challenge Net Sec Challenge Net Sec Challenge

    TE
    Team Ciphers Security

    The Ciphers Security editorial team — practitioners covering daily threat intel, CVE deep-dives, and hands-on cybersecurity research. About us →

    Previous TryHackMe Walkthrough: Protocols and Servers Next TryHackMe Walkthrough: Protocols and Server 2

    Latest News

    YARA-X 1.16.0: Faster Scans, Panic Fixes, and Neovim LSP Support YARA-X 1.16.0 ships with performance improvements across 10 PRs, constant folding for bitwise ops, configurable mat… Instructure Removed from ShinyHunters' Leak Site as Canvas Breach Deadline Passes Instructure was quietly removed from ShinyHunters' extortion site after the May 12, 2026 deadline — no data dump, n… Costa Rica Joins Have I Been Pwned as the 42nd Government Costa Rica's CSIRT gains free access to Have I Been Pwned's government domain monitoring service, becoming the 42nd… LummaC2 Infostealer Targets US Critical Infrastructure: CISA-FBI Advisory AA25-141B and DOJ Domain Seizures CISA and FBI advisory AA25-141B details LummaC2 MaaS infostealer TTPs targeting critical infrastructure. DOJ seized… MacSync Stealer: Hackers Abuse Google Ads and Claude.ai Chats to Push Mac Malware Russian-speaking attackers combine Google Ads and Claude.ai shared chats in a ClickFix campaign deploying MacSync S… JDownloader Site Hacked, Installers Swapped with Python RAT Malware JDownloader's website was hacked May 6–7, 2026, replacing Windows and Linux installers with a Python-based RAT. Use… Operation HookedWing: 4-Year Phishing Campaign Hits 500+ Organizations Across Aviation, Energy, and Logistics Operation HookedWing has stolen credentials from 500+ organizations in aviation, energy, logistics, and critical in… Twelve Critical vm2 Node.js Vulnerabilities Enable Sandbox Escape and Arbitrary Code Execution A dozen CVEs in the vm2 Node.js sandbox library — including CVSS 10.0 flaws — allow sandbox escape and RCE. Update …
    Scroll to Top