TryHackMe: Relevant — Walkthrough
<h1>Introduction</h1>
<p>This article aims to walk you through <a href="https://tryhackme.com/room/relevant" rel="noopener ugc nofollow" target="_blank"><strong>Relevant</strong></a> box produced by <a href="https://tryhackme.com/p/TheMayor" rel="noopener ugc nofollow" target="_blank"><strong>The Mayor</strong></a> and hosted on <a href="https://tryhackme.com/" rel="noopener ugc nofollow" target="_blank"><strong>TryHackMe</strong></a>.<strong> </strong>Anyone who has access to <strong>TryHackMe</strong> can try to pwn this <a href="https://www.microsoft.com/en-us/windows" rel="noopener ugc nofollow" target="_blank"><strong>Windows</strong></a> box, this is an intermediate and fun box. The creator of this box wants all practitioners to approach this box as a real life <a href="https://en.wikipedia.org/wiki/Penetration_test" rel="noopener ugc nofollow" target="_blank"><strong>penetration testing</strong></a>. Hope you enjoy reading the walkthrough!</p>
<h1>Reconnaissance</h1>
<p>First of all, we are going to start the box after accessing the relevant page.</p>
<p><img alt="" src="https://miro.medium.com/v2/resize:fit:700/1*nC7Tc0m_QRWJlXeqKLb2Vg.png" style="height:228px; width:700px" /></p>
<p>Starting Relevant</p>
<p>Waiting for a while, we are provided with <strong>IP</strong> address of the box, so we will scan it via <a href="https://nmap.org/" rel="noopener ugc nofollow" target="_blank"><strong>Nmap</strong></a>.</p>
<p><strong>Scanning</strong></p>
<p>We are going to scan the <strong>IP</strong> for all open ports by typing the following command on our terminal. <strong>-p- </strong>indicates that we want to check all open ports.</p>
<blockquote>
<p>nmap -p- 10.10.x.x</p>
</blockquote>
<p>After waiting for a while, we have got our results as shown below:</p>
<p><a href="https://ahoner.medium.com/tryhackme-relevant-walkthrough-4eacbabdf8a5"><strong>Website</strong></a></p>