Farros

Back

AI Generated ImageAI Generated Image

This is my write-up for the TryHackMe room on TakeOver. Written in 2026, I hope this write-up helps others learn and practice cybersecurity.

Task 1: Help Us#

The CEO and co-founder of futurevera.thm says their space research website is being threatened by blackhat hackers demanding ransom, claiming they can take over the site. They are asking for help to identify what the attackers could compromise.

The target website is:

https://futurevera.thm

There is a hint to add this entry to /etc/hosts:

IP_MACHINE futurevera.thm
bash

The task is to investigate the website and determine what can be taken over, then find the flag value.

Okay, I’m using RustScan here, so let’s run it:

rustscan -a IP_MACHINE
bash

alt text

We found 3 open ports:

PORT    STATE SERVICE REASON
22/tcp  open  ssh     syn-ack
80/tcp  open  http    syn-ack
443/tcp open  https   syn-ack
bash

However, when we open the website, we get:

alt text

We need to edit the hosts file to add the IP:

sudo nano /etc/hosts
bash

Then we add:

10.49.162.160 *.futurevera.thm 10.49.162.160 futurevera.thm

alt text

The website can be opened, but there is a security warning:

alt text

Let’s run Gobuster:

gobuster dir -vv -o gob -u https://10.49.162.160 -w /usr/share/wordlists/dirb/common.txt -k
bash

alt text

Nothing was found, so we’ll try subdomain enumeration. Here, I’m installing SecLists:

snap install seclists
bash

alt text

Using the information from that directory, let’s run the wordlist:

gobuster vhost -vv -k --append-domain -u https://futurevera.thm -w /snap/seclists/current/Discovery/Web-Content/common.txt -o sub_gob2
bash

alt text

We search for the “Found” results:

grep Found sub_gob2
bash

alt text

The text seems to hint that this website is for support, so let’s try the support subdomain first. We edit the hosts file again:

alt text

Let’s try opening it again:

alt text

Then we check the certificate to see if there are any insights:

alt text

We got a new hint, so let’s add it to the hosts file again:

alt text

Okay, let’s try using curl:

alt text

And we got the flag!

Thanks for reading. See you in the next lab.

TakeOver | TryHackMe Write-up
https://farrosfr.com/blog/takeover-tryhackme-write-up
Author Mochammad Farros Fatchur Roji
Published at March 2, 2026