Member-only story

TryhackMe Whiterose Room

Are you ready to dive deep into a technical analysis of how Whiterose cracked open a complex virtual host environment on TryHackMe? In our latest YouTube video, we walk through the entire process of how a seemingly mundane maintenance message hid critical access points that ultimately led to a full-blown system exploit. Here’s a quick preview of what we cover in the video!

Step 1: Discovery and Login — Setting the Scene

Whiterose kicked off the mission by discovering a virtual host and leveraging credentials found in the TryHackMe room to log in. This initial access opened up a chat room, which became the first hint in a trail of clues. By altering a parameter, Whiterose could view archived messages, eventually uncovering credentials for an admin user — an unexpected find that shifted the operation’s momentum!

🎥 Watch how we used parameter tampering to uncover hidden credentials in the chat — an easy yet effective approach for real-life applications.

Step 2: Accessing Vulnerable Settings with SSTI

With admin access in hand, Whiterose navigated to the settings page, which turned out to be vulnerable to Server-Side…

--

--

MatSec
MatSec

Written by MatSec

Security Researcher | Senior Engineer - Information Security | Bug Hunter

No responses yet