TryHackMe — All-in-One — 00 | Prerequisites
好的,我现在要帮用户总结一篇文章的内容,控制在100字以内。用户的要求很明确,不需要以“文章内容总结”这样的开头,直接写描述即可。 首先,我需要通读整篇文章,抓住主要内容。文章主要讲的是如何在TryHackMe平台上设置稳定的环境来解决挑战。作者使用了免费账户,详细介绍了注册、下载OpenVPN配置、连接到机器的步骤。此外,作者还分享了自己的配置流程,包括使用Windows作为主系统、Kali Linux VM运行工具、Burp Suite代理以及VPS进行SSH隧道连接,以绕过网络限制。 接下来,我要提炼这些信息,确保在100字以内涵盖主要点:注册、OpenVPN连接、配置流程和工具使用。同时,语言要简洁明了,避免冗余。 最后,检查字数是否符合要求,并确保内容准确无误地反映了文章的核心内容。 </think> 文章介绍了在TryHackMe平台上设置稳定环境的方法,包括注册、下载和连接OpenVPN配置、启动机器以及通过代理和SSH隧道访问受限资源的流程。 2026-2-26 13:41:8 Author: infosecwriteups.com(查看原文) 阅读量:8 收藏

mahyar kermani

Before jumping into the tryhackme machines and starting this journey, i want to share my configs — what I did on tryhackme to make a stable setup for solving the challenges.

Note: My TryHackMe account is on the free plan.

I want to share a few basics: how to sing up, setup an OpenVPN connection, and my configs for connection to and interacting with the machines.

Press enter or click to view image in full size

TryHackMe setup

TryHackMe setup

1. Create an account on TryHackMe

At the beginning, create a free account on the TryHackMe platform with your email:

1.1. Download your OpenVPN configuration

After creating your account, go to the Profile VM & VPN Settings and click the Download Regular Configuration File button to get your OpenVPN config file.

Press enter or click to view image in full size

Not working ? Go to the Networks tab and customize your config

1.2. Connect using your OpenVPN configuration

After downloading the config, move it to the OS you’ll use to connect to TryHackMe ( e.g., a Linux VM ).

You can use this command on a Linux system ( e.g., Kali ):

sudo openvpn --config eu-west-1-mahyar-regular.ovpn

If you see a log like this ( Initialization Sequence Completed ), and get an IP on tunX, your connection is successful.

Press enter or click to view image in full size

You can also check: Profile → VM & VPN Settings → Access via OpenVPN

2. Launch a Machine

After connection to TryHackMe via OpenVPN, pick a machine, start it, and connect to it using the assigned IP.

There are multiple ways to do this; view a machine from your computer; but I’ll explain my flow chart.

Press enter or click to view image in full size

My CTF Config Flow

These are the assets I use in this CTF series:

  • Windows as my main OS
  • A Kali Linux VM for my tools
  • Burp suite on the Kali Linux VM as a proxy between Windows and Kali
  • A VPS used for ssh tunneling on Kali Linux VM for a connection to OpenVPN

For example, the first machine we’ll cover in the next article is:

On that page you’ll see a “Join Room” message/button — click it to join the room.

Press enter or click to view image in full size

Join room in TryHackMe

This message appears at the beginning of each room. Click “Join Room” to activate the room on your profile.

Press enter or click to view image in full size

Brooklyn Nine Nine machine

Click the light-green “Start Machine” button in the Task 1 tab.

Get mahyar kermani’s stories in your inbox

Join Medium for free to get updates from this writer.

Remember me for faster sign in

After a minute the machine will be assigned an IP address, which you can access from your Linux VM connected via OpenVPN:

Press enter or click to view image in full size

Machine IP

To verify the connection, you can ping that IP:

Ping machine IP

2.1. How to view the machine via browser

Almost all TryHackMe machines include a web application accessible via the assigned IP.

There are multi ways too which you can see the web pages from your computer, but here, as i told you, i want to show and explain my flow.

I use VPS because the TryHackMe platform is blocked in my country. So I use an extra layer ( The VPS and SSH tunnel ) to bypass the filter and access the site and lab web pages.

As described, I use Windows as my main OS for browsing, and capture the requests/responses with Burp Suite on the Kali Linux VM.

Note: I browse on Windows because Kali runs as a VM and is slower.

So I browse in Windows, capture traffic in Burp on Kali, and run some tools on the VPS.

I create an SSH dynamic forwarding tunnel from Kali to the VPS ( used as a SOCKS proxy ):

ssh root@[MY-VPS-IP] -q -D 1080

Then, I open Burp Suite on Kali ( the OS with the SSH tunnel ) and set a Proxy listener on 192.168.1.178:8080 and the SOCKS proxy to 127.0.0.1:1080.

burp SOCKS proxy

Then, I configure Firefox on Windows to use Burp’s proxy; so I can browse the machine from Windows.

Press enter or click to view image in full size

Set Burp’s proxy for firefox in settings

Note: my Windows OS and Kali VM are on the same network.

Finally, with this setup, when I load the machine IP in Windows, two things happen:

  1. Bypass TryHackMe filtering in my country using the VPN
  2. capture the machine’s requests/responses in Burp

And the flow will be something like this:

  1. Requests are forwarded to the Kali VM → Burp listener
  2. Burp forward the requests to the VPS via the SSH tunnel
  3. the VPS forward them to the TryHackMe platform via the OpenVPN connection
  4. TryHackMe will forward the requests to the target machine IP on the VPN network
  5. Responses follow the reverse path, so you can inspect them in Burp as well.

Press enter or click to view image in full size

Work with the CTF machine from my windows

Press enter or click to view image in full size

request/response from CTF machine in Burp

3. Summary

In this article we learned how to launch a TryHackMe machine and set up a testbed. I also explained the workflow i use for this CTF series. You can follow this setup exactly or adapt it to your own assets.

In the next article of this TryHackMe — All-in-One series, we’ll go straight to the CTF machines, starting with Brooklyn Nine-Nine.


文章来源: https://infosecwriteups.com/tryhackme-all-in-one-00-prerequisites-78fb0630240e?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh