Post

TakeOver Room

TakeOver Room

Welcome to the TakeOver Challenge Room on Try Hack Me!

So, it’s important to have your basics regarding certificates and domains clear before starting this room.

Scenario: One of the co-founders of futurevera[.]thm is trying to rebuild their support in order to answer any space-related questions by students.

Recently, blackhat hackers approached them, saying they could take over and are asking them for a big ransom. We need to help the co-founder find what they can take over.

Alright, let’s get started!

As per the room, we need to add ‘target ip’ in /etc/hosts for futurevera[.]thm

This can be done using the nano /etc/hosts and now you can enter the info and save it.

TASK 1: Help Us

Firstly, to find what the attackers can exploit, we need to have an attacker’s mindset. I began by starting with the first step that any attacker would start with, according to frameworks like MITRE ATT&CK or be it Cyber Kill Chain, i.e, Reconnaissance.

Basically, finding out what all ports and services are open and running. For this, there can be no better tool than Nmap.

So, I started using the following scan

1
nmap -A 10.10.81.145

-A flag here is used for aggressive scan, providing us with the maximum information that we can get.

Here’s what we found

Task-1-1

We see that Port 22, 80 and 443 is open

Furthermore, the certificate being used is an SSL Certificate, and if we carefully observe the dates, then we see it has expired way back in 2023.

Since the room description mentions subdomain enumeration, we need to shift our focus to that, keeping the above info in mind.

Subdomain enumeration is the process of finding subdomains associated with a main domain (like example.com). These subdomains (like admin.example.com, mail.example.com, test.example.com) can reveal hidden services, development environments, or even vulnerable systems that attackers might exploit.

We can find subdomains using various open-source tools available on the internet, be it Fuff, Sublist3r, etc.

See, our last option is to use these tools to get the subdomains. But …

With a bit of attention to detail, we know that the co-founder is working on rebuilding support, then why not give it a shot!

Again, we need to add this to our /etc/host as done before.

Task-1-2

We actually found a subdomain with support!

If we browse this, we get something like this (Obviously, since the certificate is not valid !)

Task-1-3

Let’s view the certificate

Task-1-4

On inspecting the certificate, I found that it had an alternative DNS Name. So, I tried repeating the same steps that I did for the support subdomain, i.e, to add it to /etc/hosts

On trying to access that particular domain subdomain in the browser, we get our flag displayed right in front of us.

Task-1-5

It was a simple room, I must say. Congratulations on completing this room! 🎉


Professional Analysis

Detection & Impact

Understanding how attackers think is essential for detecting threats before they can cause damage. Using the MITRE ATT&CK Framework helps analysts recognize common tactics and techniques used by adversaries. In this room, I used Nmap not only to detect open ports (22, 80, and 443), but also to perform vulnerability scans using its NSE scripts. This revealed potentially exploitable services, even over HTTPS. The absence of valid digital certificates was another key finding, as it can open the door to man-in-the-middle attacks and erode trust. These detections highlight the broader impact, exposed services and misconfigurations can lead to serious consequences, including ransomware infections or credential theft through vulnerable subdomains.

Real-World Application

In real-world environments, Nmap is an industry-standard tool critical for network administrators, cybersecurity professionals, and incident responders. It is widely used for service hardening by helping them identify unnecessary open ports that should be closed and ensuring that only business-essential services are reachable from the internet. In the field of cybersecurity, digital certificates play a vital role in establishing trust, proving identity, and enabling encrypted communication between clients and servers. Misconfigured or missing certificates can lead to severe consequences such as man-in-the-middle attacks or credential theft. This room highlights how tools like Nmap, combined with proper reconnaissance and analysis, can uncover security gaps, helping defenders secure their environments before attackers exploit them.

Security Implications

The vulnerabilities explored in this room reflect real-world risks that can significantly impact both businesses and individuals. Misconfigured services, exposed ports, and weak security controls can open the door to data breaches, system compromise, or service outages. One often overlooked but critical issue is the use of expired or improperly configured digital certificates. When certificates are invalid or use outdated encryption algorithms, modern browsers may flag the site as untrusted or malicious, preventing users from accessing the service altogether. This not only causes a loss of customer trust but can also lead to revenue loss and reputational damage, especially for businesses that rely heavily on online presence. These risks highlight the importance of maintaining strong digital hygiene, including regular certificate validation and service monitoring to ensure operational continuity.
This post is licensed under CC BY 4.0 by the author.