LIVE NEWSROOM · --:-- · May 15, 2026
A LIBRARY FOR SECURITY RESEARCHERS

TryHackMe Walkthrough: Protocols and Server 2

Post on X LinkedIn
TryHackMe Walkthrough: Protocols and Server 2

The Protocols and Servers room covered many protocols:

Room Link: Protocols and Server 2

  • Telnet
  • HTTP
  • FTP
  • SMTP
  • POP3
  • IMAP

Servers implementing these protocols are subject to different kinds of attacks. To name a few, consider:

  1. Sniffing Attack (Network Packet Capture)
  2. Man-in-the-Middle (MITM) Attack
  3. Password Attack (Authentication Attack)
  4. Vulnerabilities

From a security perspective, we always need to think about what we aim to protect; consider the security triad: Confidentiality, Integrity, and Availability (CIA). Confidentiality refers to keeping the contents of the communications accessible to the intended parties. 

Integrity is the idea of assuring any data sent is accurate, consistent, and complete when reaching its destination. Finally, availability refers to being able to access the service when we need it.

Different parties will put varying emphasis on these three. For instance, confidentiality would be the highest priority for an intelligence agency. Online banking will put most emphasis on the integrity of transactions. Availability is of the highest importance for any platform making money by serving ads.

// 01 Task 2 Sniffing Attack Protocols and Server

Question: What do you need to add to the command sudo tcpdump to capture only Telnet traffic?
Answer: port 23

Question: What do you need to add to the command sudo tcpdump to capture only Telnet traffic?
Answer: IMAP

// 02 Task 3 Man-in-the-Middle (MITM) Attack Protocols and Server

Question: How many different interfaces does Ettercap offer?
Answer: 3

Question: In how many ways can you invoke Bettercap?
Answer: 3

// 03 Task 4 Transport Layer Security (TLS) Protocols and Server

Question: DNS can also be secured using TLS. What is the three-letter acronym of the DNS protocol that uses TLS?
Answer: DoT

// 04 Task 5 Secure Shell (SSH) Protocols and Server

Question: Use SSH to connect to 10.10.173.171 as mark with the password XBtc49AB. Using uname -r, find the Kernel release?
Answer: 5.4.0-84-generic

Question: Use SSH to download the file book.txt from the remote system. How many KBs did scp display as download size?
Answer: 415

// 05 Task 6 Password Attack Protocols and Server

Question: We learned that one of the email accounts is lazie. What is the password used to access the IMAP service on 10.10.173.171?

  1. we need to do a brute force attack to find the password for account lazie
  2. here we are going to use hydra tool for brute forcing password over a server
  3. open terminal and type the following command
  4. hydra -l lazie -P /usr/share/wordlists/rockyou.txt 10.10.173.171 imap
  5. you’ll get the password after the process is completed
hydra tool

Answer: butterfly

// 06 Task 7 Summary

default ports and protocols
Hydra tool usage

    TE
    Team Ciphers Security

    The Ciphers Security editorial team — practitioners covering daily threat intel, CVE deep-dives, and hands-on cybersecurity research. About us →

    Previous TryHackMe Walkthrough: Net Sec Challenge Next TryHackMe Walkthrough: Network Security Protocols

    Latest News

    YARA-X 1.16.0: Faster Scans, Panic Fixes, and Neovim LSP Support YARA-X 1.16.0 ships with performance improvements across 10 PRs, constant folding for bitwise ops, configurable mat… Instructure Removed from ShinyHunters' Leak Site as Canvas Breach Deadline Passes Instructure was quietly removed from ShinyHunters' extortion site after the May 12, 2026 deadline — no data dump, n… Costa Rica Joins Have I Been Pwned as the 42nd Government Costa Rica's CSIRT gains free access to Have I Been Pwned's government domain monitoring service, becoming the 42nd… LummaC2 Infostealer Targets US Critical Infrastructure: CISA-FBI Advisory AA25-141B and DOJ Domain Seizures CISA and FBI advisory AA25-141B details LummaC2 MaaS infostealer TTPs targeting critical infrastructure. DOJ seized… MacSync Stealer: Hackers Abuse Google Ads and Claude.ai Chats to Push Mac Malware Russian-speaking attackers combine Google Ads and Claude.ai shared chats in a ClickFix campaign deploying MacSync S… JDownloader Site Hacked, Installers Swapped with Python RAT Malware JDownloader's website was hacked May 6–7, 2026, replacing Windows and Linux installers with a Python-based RAT. Use… Operation HookedWing: 4-Year Phishing Campaign Hits 500+ Organizations Across Aviation, Energy, and Logistics Operation HookedWing has stolen credentials from 500+ organizations in aviation, energy, logistics, and critical in… Twelve Critical vm2 Node.js Vulnerabilities Enable Sandbox Escape and Arbitrary Code Execution A dozen CVEs in the vm2 Node.js sandbox library — including CVSS 10.0 flaws — allow sandbox escape and RCE. Update …
    Scroll to Top