Highlight: THM Wreath [Easy] | Part 5: Tasks 35-46
Wreath
Learn how to pivot through a network by compromising a public facing web machine and tunnelling your traffic to access other machines in Wreath's network. (Streak limitation only for non-subscribed users)
[https://tryhackme.com/room/wreath](https://tryhackme.com/room/wreath)
This session we covered:
Task 35 Personal PC The Wonders of Git
Task 36 Personal PC Website Code Analysis
Task 37 Personal PC Exploit PoC
Task 38 AV Evasion Introduction
Task 39 AV Evasion AV Detection Methods
Task 40 AV Evasion PHP Payload Obfuscation
Task 41 AV Evasion Compiling Netcat & Reverse Shell!
Task 42 AV Evasion Enumeration
Task 43 AV Evasion Privilege Escalation
Task 44 Exfiltration Exfiltration Techniques & Post Exploitation
Task 45 Conclusion Debrief & Report
Task 46 Conclusion Final Thoughts -- Watch live at https://www.twitch.tv/msec