TryHackMe: A Beginners guide to Enter the world of CyberSecurity | by Ayushr | Nov, 2023 | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware

In the evolving landscape of cybersecurity, the need for practical, hands-on experience is paramount. TryHackMe emerges as a pivotal platform in this context, offering a diverse range of interactive learning experiences tailored to the needs of aspiring cybersecurity professionals. This chapter serves as an introduction to TryHackMe, exploring its features, offerings, and why it’s become a go-to resource for learning cybersecurity.

What is TryHackMe?

TryHackMe is an online platform designed to teach cybersecurity in an interactive, accessible manner. It caters to a wide range of users, from beginners to advanced learners, providing them with a safe and controlled environment to practice hacking skills and learn about various aspects of cybersecurity.

The Importance of TryHackMe in Cybersecurity Education:

The platform’s importance lies in its practical approach to learning. Unlike traditional educational methods that often rely heavily on theoretical knowledge, TryHackMe emphasizes hands-on experience. This approach is crucial in a field where real-world skills are as important as academic knowledge. By offering a variety of rooms and challenges, TryHackMe allows users to apply theoretical concepts in practical scenarios, thereby enhancing their understanding and skills in cybersecurity

Introduction to Hacking using TryHackMe

TryHack me provides foundations of methodology required to learn Hacking. One of the many fascinating Modules named “Become a Hackers” involves basic yet essential tasks. Moreover, The provision of readily available split screen allows learners to simultaneously view instructional content and interact with a live terminal or virtual machine directly within the same browser window

Dynamic Split Screen Feature

The realm of ethical hacking is vast and filled with numerous techniques and tools aimed at strengthening cybersecurity. One fundamental skill in this field is the ability to discover hidden or unlisted pages in web applications. A practical exercise on TryHackMe, a popular online platform for learning cybersecurity, offers beginners a hands-on experience in this area.

Task 1: In this exercise, we are tasked with assessing a test website developed by Mike, who is concerned about potential cybersecurity threats. The primary objective is to identify any private pages that might be inadvertently exposed to the public.

Manual Exploration:

The first step involves manually checking for hidden pages. This is done by appending different paths like /sitemap, /mail, /login, /register, and /admin to the base URL of the test website. This method, while straightforward, is crucial for understanding the basic approach to finding hidden directories in a web application.

Automated Discovery with Gobuster:

For a more thorough search, the exercise introduces the use of Gobuster, an automated tool for discovering hidden pages. The command used is gobuster dir — url http://www.onlineshop.thm/ -w /usr/share/wordlists/dirbuster/directory-list.txt, which automates the process of directory discovery using a predefined word list.

This exercise is not just about learning to use tools, it’s about understanding the methodology behind ethical hacking. It provides a foundation in basic hacking techniques and familiarizes beginners with essential tools like Gobuster. More importantly, it demonstrates the practical application of these skills in a real-world scenario, a crucial aspect of learning in the field of cybersecurity.

Through this exercise, TryHackMe effectively bridges the gap between theoretical knowledge and practical application, making it an invaluable resource for anyone starting their journey in ethical hacking.

Task 2: Password Attack Strategies in Ethical Hacking

In the field of cybersecurity, understanding and executing password attacks is a crucial skill for ethical hackers. The TryHackMe platform provides an excellent hands-on exercise to illustrate this concept, teaching both manual and automated password attack strategies.

Manual Password Attack:

The exercise begins with a scenario where the user must gain access to a hidden login page. The manual approach involves using ‘admin’ as the username and trying a list of common passwords like ‘abc123’, ‘123456’, ‘qwerty’, ‘password’, and ‘654321’. This method, while simple, is effective in scenarios where the password complexity is low. In this case, the password ‘qwerty’ successfully grants access, demonstrating the effectiveness of manual password guessing in certain situations.

Automated Password Attack with Hydra:

For more complex scenarios, the exercise introduces Hydra, an automated tool for conducting password attacks. The command used in the exercise (hydra -l admin -P passlist.txt www.onlineshop.thm http-post-form “/login:username=^USER^&password=^PASS^:F=incorrect” -V) automates the process of trying multiple password combinations. This approach is essential when dealing with many potential passwords, showcasing the efficiency and necessity of automated tools in ethical hacking.

This exercise not only teaches the technical aspects of password attacks but also highlights the importance of choosing strong, non-common passwords for web applications. For beginners in cybersecurity, it provides a practical understanding of a fundamental aspect of security testing and ethical hacking. The exercise effectively demonstrates the difference between manual and automated methods, emphasizing the role of tools like Hydra in modern cybersecurity practices.

Positive Definitions of a Hacker:

The term ‘hacker’ often conjures up a variety of images and definitions, depending on the context. In the realm of cybersecurity, it’s essential to understand the different facets of this term, especially the positive connotation associated with white hat hackers, or ethical hackers. This chapter explores these various definitions and how TryHackMe plays a pivotal role in nurturing aspiring hackers.

In a positive light, a hacker is someone who uses their technical skills to creatively overcome challenges. This can involve modifying software or hardware to enhance its performance, or even creating new technological solutions. The term is also synonymous with individuals who find and report vulnerabilities in computer systems and networks, thereby improving security. These are the white hat hackers, who operate legally and ethically, using their skills for the greater good.

TryHackMe’s Educational Approach:

TryHackMe, with its extensive range of over 700 rooms, offers a comprehensive platform for those aspiring to become ethical hackers. The platform is divided into two main types of rooms: walkthrough rooms and challenge rooms. Walkthrough rooms provide guided learning experiences, complete with exercises and demonstrations to help users grasp various cybersecurity concepts. On the other hand, challenge rooms offer a more hands-on approach, allowing users to test their skills and solidify their knowledge.

Modules and Learning Paths:

TryHackMe further organizes its content into modules and learning paths. Each module focuses on a specific topic, providing a coherent and in-depth exploration of that area. These modules are then grouped into learning paths, offering a structured approach to mastering various aspects of cybersecurity.

Career Choices in Cybersecurity: Ethical Hacking Focus

In the dynamic field of cybersecurity, particularly in the realm of ethical hacking, there are several career paths that one can pursue. This chapter will explore three such paths: Penetration Tester, Red Team Operator, and Security Analyst. Each role offers unique challenges and opportunities, and the choice of career can significantly impact one’s journey in the cybersecurity landscape.

1. Penetration Tester:

Penetration Testers, also known as ethical hackers, are responsible for identifying vulnerabilities in computer systems, networks, and applications. They simulate cyber attacks to assess the security of these systems. This role requires a deep understanding of various aspects of information security and the ability to develop new testing methods.

2. Red Team Operator:

Red Team Operators focus on offensive security measures, emulating cybercriminals to test and improve security systems. They play a crucial role in identifying and mitigating potential threats, working closely with defensive teams to enhance overall security.

3. Security Analyst:

Security Analysts are responsible for monitoring and protecting sensitive data and systems from cyber threats. They analyze security breaches and implement measures to prevent future attacks. This role involves a mix of technical skills and an understanding of current cybersecurity trends and threats.


Considering the current and future technology trends, the role of a Red Team Operator stands out as the most promising career choice. With the increasing complexity of cyber threats and the need for proactive offensive security measures, Red Team Operators are essential in identifying and mitigating these threats. Their role is not only crucial but also continuously evolving, offering a challenging and rewarding career path in the field of cybersecurity.

In conclusion, while all three career paths offer valuable experiences and opportunities, the Red Team Operator role aligns closely with the advancing trends in technology and cybersecurity, making it a highly recommended career choice for those interested in ethical hacking

Drawing Inspiration from Success Stories: My Path to Cyber Security Excellence

As someone new to the field of cyber security, I am constantly seeking guidance and inspiration from those who have successfully navigated this challenging yet rewarding domain. The stories of Charlie and Brandon, shared on TryHackMe’s blog, offer valuable insights into the paths they took to achieve success in cyber security. Their experiences have significantly influenced my strategy for building a successful career in this field.

My Strategy for Success

1. Continuous Learning: Following Charlie and Brandon’s footsteps, I will prioritize continuous learning and skill development. Engaging with platforms like TryHackMe will be crucial for gaining practical experience and staying updated with the latest trends and threats in cyber security.

2. Practical Application: I understand the importance of applying theoretical knowledge in real-world scenarios. Participating in Capture The Flag (CTF) events and practical labs will help me apply what I learn and develop problem-solving skills.

3. Networking and Community Engagement: Building a network within the cyber security community and engaging in forums and discussions will provide me with diverse perspectives and guidance.

4. Persistence and Patience: Embracing challenges and being persistent in overcoming obstacles will be key. I will maintain patience as I progress through my learning journey, understanding that expertise in cyber security is a result of consistent effort and practice.

5. Setting Clear Goals: I will set clear, achievable goals for my career progression, ensuring that I have a focused path to follow.

Strategical Mind-Map

By adopting these strategies of continuous learning, practical application, and persistence, I am confident in my ability to build a successful career in this ever-evolving field.


Click Here For The Original Source.

National Cyber Security