# THM

<div align="left" data-full-width="false"><figure><img src="/files/LZEkLpqoqopsDkv1mtxi" alt=""><figcaption><p>tryhackme.com - © TryHackMe</p></figcaption></figure></div>

## Rooms

* [OWASP](/writeups-and-walkthroughs/thm/owasp.md)

#### Active Directory

* [Active Directory Basics](/writeups-and-walkthroughs/thm/active-directory-basics.md) (This room will introduce the basic concepts and functionality provided by Active Directory)
* [AD: Basic Enumeration](/writeups-and-walkthroughs/thm/ad-basic-enumeration.md) (This room covers various Active Directory enumeration techniques, their use cases as well as drawbacks)
* [Enumerating Active Directory](/writeups-and-walkthroughs/thm/enumerating-active-directory.md) (This room covers various Active Directory enumeration techniques, their use cases as well as drawbacks)
* [Breaching Active Directory](/writeups-and-walkthroughs/thm/breaching-active-directory.md) (This network covers techniques and tools that can be used to acquire that first set of AD credentials that can then be used to enumerate AD)
* [Attacking Kerberos](/writeups-and-walkthroughs/thm/attacking-kerberos.md) (Learn how to abuse the Kerberos Ticket Granting Service inside of a Windows Domain Controller)
* [Attacktive Directory](/writeups-and-walkthroughs/thm/attacktive-directory.md) (99% of Corporate networks run off of AD. But can you exploit a vulnerable Domain Controller?)
* [Exploiting Active Directory](/writeups-and-walkthroughs/thm/exploiting-active-directory.md) (Learn common AD exploitation techniques that can allow you to reach your goal in an AD environment)
* [Post-Exploitation Basics ](/writeups-and-walkthroughs/thm/post-exploitation-basics.md)(Learn the basics of post-exploitation and maintaining access with mimikatz, bloodhound, powerview and msfvenom)
* [Lateral Movement and Pivoting](/writeups-and-walkthroughs/thm/lateral-movement-and-pivoting.md) (Learn about common techniques used to move laterally across a Windows network).

## CTFs

* [RootMe](/writeups-and-walkthroughs/thm/rootme.md)
* [Simple CTF](/writeups-and-walkthroughs/thm/simple-ctf.md)
* [Eternal Blue](/writeups-and-walkthroughs/thm/eternal-blue.md)
* [Vulnversity](/writeups-and-walkthroughs/thm/vulnversity.md)
* [Pickle Rick](/writeups-and-walkthroughs/thm/pickle-rick.md)
* [Brooklyn Nine Nine](/writeups-and-walkthroughs/thm/brooklyn-nine-nine.md)
* [Kenobi](/writeups-and-walkthroughs/thm/kenobi.md)
* [Bounty Hacker](/writeups-and-walkthroughs/thm/bounty-hacker.md)
* [Overpass](/writeups-and-walkthroughs/thm/overpass.md)
* [LazyAdmin](/writeups-and-walkthroughs/thm/lazyadmin.md)
* [Ignite](/writeups-and-walkthroughs/thm/ignite.md)
* [Bolt](/writeups-and-walkthroughs/thm/bolt.md)
* [Agent Sudo](/writeups-and-walkthroughs/thm/agent-sudo.md)
* [Startup](/writeups-and-walkthroughs/thm/startup.md)
* [Wgel](/writeups-and-walkthroughs/thm/wgel.md)
* [Blog](/writeups-and-walkthroughs/thm/blog.md)
* [ColdBox](/writeups-and-walkthroughs/thm/coldbox.md)
* [Lian\_Yu](/writeups-and-walkthroughs/thm/lian_yu.md)
* [Blaster](/writeups-and-walkthroughs/thm/blaster.md)
* [Ice](/writeups-and-walkthroughs/thm/ice.md)
* [Smag Grotto](/writeups-and-walkthroughs/thm/smag-grotto.md)
* [The Sticker Shop](/writeups-and-walkthroughs/thm/the-sticker-shop.md)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://dev-angelist.gitbook.io/writeups-and-walkthroughs/thm.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
