TryHackMe: Relevant — Walkthrough

<h1>Introduction</h1> <p>This article aims to walk you through&nbsp;<a href="https://tryhackme.com/room/relevant" rel="noopener ugc nofollow" target="_blank"><strong>Relevant</strong></a>&nbsp;box produced by&nbsp;<a href="https://tryhackme.com/p/TheMayor" rel="noopener ugc nofollow" target="_blank"><strong>The Mayor</strong></a>&nbsp;and hosted on&nbsp;<a href="https://tryhackme.com/" rel="noopener ugc nofollow" target="_blank"><strong>TryHackMe</strong></a>.<strong>&nbsp;</strong>Anyone who has access to&nbsp;<strong>TryHackMe</strong>&nbsp;can try to pwn this&nbsp;<a href="https://www.microsoft.com/en-us/windows" rel="noopener ugc nofollow" target="_blank"><strong>Windows</strong></a>&nbsp;box, this is an intermediate and fun box. The creator of this box wants all practitioners to approach this box as a real life&nbsp;<a href="https://en.wikipedia.org/wiki/Penetration_test" rel="noopener ugc nofollow" target="_blank"><strong>penetration testing</strong></a>. Hope you enjoy reading the walkthrough!</p> <h1>Reconnaissance</h1> <p>First of all, we are going to start the box after accessing the relevant page.</p> <p><img alt="" src="https://miro.medium.com/v2/resize:fit:700/1*nC7Tc0m_QRWJlXeqKLb2Vg.png" style="height:228px; width:700px" /></p> <p>Starting Relevant</p> <p>Waiting for a while, we are provided with&nbsp;<strong>IP</strong>&nbsp;address of the box, so we will scan it via&nbsp;<a href="https://nmap.org/" rel="noopener ugc nofollow" target="_blank"><strong>Nmap</strong></a>.</p> <p><strong>Scanning</strong></p> <p>We are going to scan the&nbsp;<strong>IP</strong>&nbsp;for all open ports by typing the following command on our terminal.&nbsp;<strong>-p-&nbsp;</strong>indicates that we want to check all open ports.</p> <blockquote> <p>nmap -p- 10.10.x.x</p> </blockquote> <p>After waiting for a while, we have got our results as shown below:</p> <p><a href="https://ahoner.medium.com/tryhackme-relevant-walkthrough-4eacbabdf8a5"><strong>Website</strong></a></p>