LIVE NEWSROOM · --:-- · May 14, 2026
A LIBRARY FOR SECURITY RESEARCHERS

TryHackMe Walkthrough: Protocols and Servers

Post on X LinkedIn
TryHackMe Walkthrough: Protocols and Servers

This room introduces the user to a few protocols commonly used, such as:

  • HTTP
  • FTP
  • POP3
  • SMTP
  • IMAP

Room Link: Protocols and Servers

Each task about each protocol will be designed to help us understand what happens on the low level and is usually hidden by an elegant GUI (Graphical User Interface).

We will “talk” using the above protocols using a simple Telnet client to fully understand what your GUI client is doing under the hood. Our purpose is not to memorize the protocol commands but rather to get a closer look at the protocol while it is working.

We also discuss some of the insecurities. In particular, we focus on passwords sent in cleartext.

// 01 Task 2 Telnet Protocols

Question: To which port will the telnet command with the default parameters try to connect?
Answer: 23

// 02 Task 3 Hypertext Transfer Protocol (HTTP) Protocols

Question: Launch the attached VM. From the AttackBox terminal, connect using Telnet to 10.10.197.110 80 and retrieve the file flag.thm. What does it contain?

Steps:-

  1. Launch the VM
  2. open the terminal and use telnet to browse the flag upon web service at port 80
  3. telnet 10.10.197.110 80
  4. GET /flag.thm HTTP/1.1
    host: telnet
  5. you’ll get the flag
TryHackMe Walkthrough: Protocols and Servers

Answer: THM{e3eb0a1df437f3f97a64aca5952c8ea0}

// 03 Task 4 File Transfer Protocol (FTP) Protocols

Question: Using an FTP client, connect to the VM and try to recover the flag file. What is the flag?

  • Username: frank
  • Password: D2xc9CgD
  1. create the FTP connection with the following credentials
  2. ftp 10.10.197.110
  3. provide the username and password
  4. now use ls command for listing the content
  5. you’ll see the flag file, now you need to read it, for reading you need to download it to your local system
  6. for downloading the file, use get command { get ftp_flag.thm }
  7. after that, open another terminal and read the file with cat command
TryHackMe Walkthrough: Protocols and Servers 1

Answer: THM{364db6ad0e3ddfe7bf0b1870fb06fbdf}

// 04 Task 5 Simple Mail Transfer Protocol (SMTP) Protocols

Question: Using the AttackBox terminal, connect to the SMTP port of the target VM. What is the flag that you can get?
Hint: Connect the telnet using port 25, telnet 10.10.197.110 25
Answer: THM{5b31ddfc0c11d81eba776e983c35e9b5}

// 05 Task 6 Post Office Protocol 3 (POP3)

Question: Connect to the VM (10.10.197.110) at the POP3 port. Authenticate using the username frank and password D2xc9CgD. What is the response you get to STAT?

  1. connect the POP3 using telnet at port 110
  2. provide username and password
  3. USER frank
  4. PASS D2xc9CgD
  5. for 1 question, use the command STAT
  6. For 2 questions, use the command LIST

Answer: +OK 0 0

Question: How many email messages are available to download via POP3 on 10.10.197.110?
Answer: 0

// 06 Task 7 Internet Message Access Protocol (IMAP)

Question: What is the default port used by IMAP?
Answer: 143

// 07 Task 8 Summary

protocols and services

    TE
    Team Ciphers Security

    The Ciphers Security editorial team — practitioners covering daily threat intel, CVE deep-dives, and hands-on cybersecurity research. About us →

    Previous TryHackMe Walkthrough: Extending Your Network Next TryHackMe Walkthrough: Net Sec Challenge

    Latest News

    YARA-X 1.16.0: Faster Scans, Panic Fixes, and Neovim LSP Support YARA-X 1.16.0 ships with performance improvements across 10 PRs, constant folding for bitwise ops, configurable mat… Instructure Removed from ShinyHunters' Leak Site as Canvas Breach Deadline Passes Instructure was quietly removed from ShinyHunters' extortion site after the May 12, 2026 deadline — no data dump, n… Costa Rica Joins Have I Been Pwned as the 42nd Government Costa Rica's CSIRT gains free access to Have I Been Pwned's government domain monitoring service, becoming the 42nd… LummaC2 Infostealer Targets US Critical Infrastructure: CISA-FBI Advisory AA25-141B and DOJ Domain Seizures CISA and FBI advisory AA25-141B details LummaC2 MaaS infostealer TTPs targeting critical infrastructure. DOJ seized… MacSync Stealer: Hackers Abuse Google Ads and Claude.ai Chats to Push Mac Malware Russian-speaking attackers combine Google Ads and Claude.ai shared chats in a ClickFix campaign deploying MacSync S… JDownloader Site Hacked, Installers Swapped with Python RAT Malware JDownloader's website was hacked May 6–7, 2026, replacing Windows and Linux installers with a Python-based RAT. Use… Operation HookedWing: 4-Year Phishing Campaign Hits 500+ Organizations Across Aviation, Energy, and Logistics Operation HookedWing has stolen credentials from 500+ organizations in aviation, energy, logistics, and critical in… Twelve Critical vm2 Node.js Vulnerabilities Enable Sandbox Escape and Arbitrary Code Execution A dozen CVEs in the vm2 Node.js sandbox library — including CVSS 10.0 flaws — allow sandbox escape and RCE. Update …
    Scroll to Top