Can someone explain this for me pls?
In some of the commands for reverse shell there are parts like '0>&1' or '>%2' for example. I do not understand these and not sure where to look to find the relevant info
In some of the commands for reverse shell there are parts like '0>&1' or '>%2' for example. I do not understand these and not sure where to look to find the relevant info
Does experience with TryHackMe and a degree/ certification help one land an entry-level cyber job?
Hi, i was doing a room tutorial for spring4shell and mistakenly entered wrong IP.
Is the attack box somehow isolated so that I won’t, by mistake, cause some harm? E.g. when practicing pentesting in the future?
With the new jr pentester path, I have already done some of the rooms before it came out today. Should it not be right that you automatically get the tickets gor rooms you have completed?
I am on the first stage of Try HackMe, Task 7. I am supposed to match the Lockheed Martin kill chain with the MITRE Attack framework, and then match each method to a corresponding icon. There are 7 icons, but only 6 input fields. There is no input field for the reconnaissance icon. When I push the button to check answers, "at least one of your answers is incorrect." How do I move forward?
If someone got time please read below my journey. I would appreciate guidance and feedbacks.
So Last year during this time I got a notification from google password manager that My passwords was found in breach. I checked and upon searching I went to haveibeenpwned. There I got more details and found how easy It was for someone to hack me for financial or any personal gain.
Then I searched more about the databreaches and the groups like alien txt and breachforums. I saw many dumps, I went through those, was shocked. I learnt about this cycle. I learnt about the malwares, stealers, RATs, keylogger, ransomware.
I tried to reverse engineer an android application without knowing how to do it. I used burp, jadx and other tools. I went through codes of some stealers.
Finally | landed on thm and did modules for networking and currently I am doing the web pentesting modules.
Now here is the problem 1 am facing, though labs on portswigger and thm are good but Those are not fun. I feel like I am learning this attack this is basic labs are basic anyhow I will complete them cause there is a solution and a structural way to do it. But nahh I don't feel the rush. I want to do it on real systems but I know it's not legal.
So is bug bounty right for me? Should I jump in or should I just torture myself to get the labs solved first ? What's the path for me ?
Also with the evolving AI It feels that these all task will be automated and jobs will be less. I don’t know what should I do.
Kindly Drop your suggestions. It will be very helpful.
comment if you are interested and i will give you the link
I am starting THM again after 1 month. Whats the best way to study. Do i takes notes for everything? Active recall? Apart from practising labs, what are the best ways for knowledge to stick in brain. Cuz i kinda forgor most of it 💀
Spf,Dkim, dmarc = pass( not a phishing)
Just finished the SAL1 exam. 850/1000, first attempt, 3h 50m.
Three sections. Two passed, one didn’t — Section 2 (Fowl Play B1 v2). Incident classification was 150/150, which means I correctly identified everything. What cost me the section was escalation and the case report. The feedback was specific: missing precise timestamps, insufficient justification for escalation decisions, not enough context on the attacker — not just what happened, but who and why.
Section 3 (Red Alert: Command and Control) went better. 150/150 on both classification and escalation, 91/100 on the report.
What surprised me most about the exam format: there’s no hint about where to look. You get a scenario, logs, tools — and the question is what happened here. That’s closer to real work than anything else I’ve done on TryHackMe so far.
Background: I started learning security in November 2025, self-studying alongside freelance work and family. 228 rooms, 164-day streak. The SOC L1 path took about six months to complete.
Happy to answer questions about the exam format or the path.
My THM profile: tryhackme.com/p/duathron
Hi everyone,
I’m currently transitioning into cybersecurity and looking to connect with others who are also learning or interested in the field, whether you’re just starting out or already have some experience.
I’ve recently passed the ISC2 Certified in Cybersecurity (CC) and I’m now preparing for the SAL1 certification. My goal is to build strong fundamentals and eventually move into a SOC / blue team role.
I’m based in Europe and using TryHackMe as my main platform to learn and practice.
I’m mainly looking to connect with people to share knowledge, resources, and motivation while learning.
If you’re on a similar path or already working in cybersecurity, feel free to reach out.
My Tryhackme user is : TSantolini
Thanks!
Hey ho everyone! 😄
I'm currently looking for active TryHackMe users to join a small server I'm setting up. The goal is simply to learn together, connect, and share knowledge.
I know firsthand how frustrating it can be to grind through rooms completely alone, with an AI chatbot as your only conversation partner.
There are zero obligations here—no forced CTF participation and no activity requirements. Just a relaxed space to hang out and learn.
I'd lose to hear from some of you! Just drop me a DM and I'll send you an invite. 😄
Have a great day!
----------------------------------------------------------------------------------------------------------------------
Hey ho zusammen! 😄
Ich bin aktuell immer noch auf der Suche nach aktiven Leuten auf TryHackMe. Ich ziehe gerade einen kleinen Server auf, auf dem wir gemeinsam lernen, uns connecten und austauschen können.
Ich weiß selbst genau, wie es ist, wenn man sich mal wieder völlig allein durch die Räume kämpft und die KI gefühlt der einzige Gesprächspartner ist.
Bei uns gibt es null Verpflichtungen – kein CTF-Zwang und keine Mindestaktivität. Alles ganz entspannt!
Ich würde mich riesig freuen, wenn sich ein paar von euch melden. Schreibt mich einfach direkt an, dann schicke ich euch die Einladung. 😄
Habt noch einen schönen Tag!
Hi guys, I started learning on THM months ago, and now I'm posting ig reels and tiktok content explaining to the people all what i have been learning.
I don't want to teach people only theory, I want them to watch the topic of the day and put in practice what I learn and I would like to know how I can setup a VM so people can connect remotely to a VM to put in practice linux commands, SSH, RDP, etc.
I would like to replicate what we do in THM, topic your learn, topic that you put in practice right away.
Any advice will be appreciated!
If somebody has the flag that is needed at task 8 of the room vectara in the Ai odyssey 2026 event , please tell
Is anyone here planning to start TryHackMe ?
I’m thinking of starting seriously and would love to connect with people who are also beginners or currently learning. Maybe we can share resources, solve rooms together, and stay consistent :)
Hello, I am a student and I wanted to start learning with either one of the subscriptions. The upside for me is that the subscription for THM and HTB Academy is almost the same because I can use my student email from my university to do 8$ per month on HTB Academy as opposed to much more expensive pricing when you're signing up on a normal email. I was just wondering for people out there that have tried either or both, what should I go with and can I get any justification as to why I should go with that choice?
I have done THM Pre-security , Cyber 101 and Jr. Pentester Path But Still I don't feel Confident About My Knowledge , i Forgot Things so I am Confused Should I Shift to HTB , I heard that It's Hard so If I Can't Remember THM's Material Than How Would I Remember HTB's
As the title says.