Network Secure Protocols — TryHackMe Walkthrough

🃏
2 min readOct 23, 2024

--

Task 1: Introduction

No answer needed.

Task 2: TLS

What is the protocol name that TLS upgraded and built upon?

SSL

Which type of certificates should not be used to confirm the authenticity of a server?

self-signed certificate

Task 3: HTTPS

How many packets did the TLS negotiation and establishment take in the Wireshark HTTPS screenshots above?

8

What is the number of the packet that contain the GET /login when accessing the website over HTTPS?

10

Task 4: SMTPS, POP3S, and IMAPS

If you capture network traffic, in which of the following protocols can you extract login credentials: SMTPS, POP3S, or IMAP?

IMAP

Task 5: SSH

What is the name of the open-source implementation of the SSH protocol?

OpenSSH

Task 6: SFTP and FTPS

Click on the View Site button to access the related site. Please follow the instructions on the site to obtain the flag.

THM{Protocols_secur3d}

Task 7: VPN

What would you use to connect the various company sites so that users at a remote office can access resources located within the main branch?

VPN

Task 8: Closing Notes

If you’ve been following along in WireShark, just inspect packet 366.

One of the packets contains login credentials. What password did the user submit?

THM{B8WM6P}

--

--

🃏
🃏

Written by 🃏

Cybersecurity Enthusiast 💻 🖤

No responses yet