Archangel (TryHackMe) — Full Attack Chain Walkthrough
Boot2Root · Web ExploitationOverview: Compromised a Linux-based target using a structured penetration testing methodology. Identified and exploited a Local File Inclusion (LFI) vulnerability, escalated it to Remote Code Execution (RCE) via log poisoning, established a reverse shell, and chained multiple misconfigurations to achieve full root compromise.
Attack Chain: Reconnaissance → Directory Enumeration → LFI Discovery → LFI-to-RCE → Reverse Shell → Cron Abuse → SUID Binary Analysis → PATH Hijacking.
Key Takeaways: Demonstrates real-world exploit chaining, manual testing discipline, and the ability to translate technical flaws into concrete security impact.
View Full Walkthrough (PDF) ↗