Room Banner

Peak Hill

Exercises in Python library abuse and some exploitation techniques

medium

75 min

Room progress ( 0% )

To access material, start machines and answer questions login.

Task 1Peak Hill


Deploy and compromise the machine!
Make sure you're connected to TryHackMe's network.

Answer the questions below

What is the user flag?

What is the root flag?

Created by

Room Type

Free Room. Anyone can deploy virtual machines in the room (without being subscribed)!

Users in Room

6,348

Created

1907 days ago

Ready to learn Cyber Security? Create your free account today!

TryHackMe provides free online cyber security training to secure jobs & upskill through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information contact us.

Read more