TryHackMe Hackfinity Battle Encore Writeup | Ethical Hacking CTF Walkthrough

TryHackMe Hackfinity Battle Encor walkthrough begins with a warm greeting and a heads-up about the video’s two-hour runtime. The creator…

TryHackMe Hackfinity Battle Encore Writeup | Ethical Hacking CTF Walkthrough

TryHackMe Hackfinity Battle Encor walkthrough begins with a warm greeting and a heads-up about the video’s two-hour runtime. The creator sets the tone for an immersive ethical hacking experience. The TryHackMe Hackfinity Battle is presented as a well-rounded CTF with categories including forensics, cryptography, reversing, game hacking, and blockchain exploitation.

TryHackMe SAL1 Study Notes & Guide
TryHackMe SAL1 Study Notes is designed as a comprehensive guide for cybersecurity beginners and those preparing for the…
Open Source Intelligence (OSINT) Study Notes
Table of Contents:Definition of OSINTOSINT Stages Planning Data Collection Data Processing Data Analysis Dissemination…

Overview of Hackfinity Battle CTF

The walkthrough begins with a warm greeting and a heads-up about the video’s two-hour runtime. The creator sets the tone for an immersive ethical hacking experience. The TryHackMe Hackfinity Battle is presented as a well-rounded CTF with categories including forensics, cryptography, reversing, game hacking, and blockchain exploitation.

Real-World Image Forensics

We are tasked with identifying a location from a street photo. The walkthrough demonstrates practical analysis techniques: identifying textual clues on walls, tracing them via Google, and matching them to venues like burger restaurants nearby. It teaches geographic inference using visual evidence and online tools.

Decrypting Pigpen Cipher in CCTV Image

A cryptic message is hidden in a CCTV image using Pigpen Cipher. Using online tools, the speaker translates symbols to plain text (e.g., “meet at THM tori portal”). This segment bridges steganography and classic pen-and-paper ciphers, emphasizing creativity in uncovering covert messages.

RSA Debugging Exploit to Recover Private Key

Debugging data left on an infected machine helps recover RSA private keys using mathematical scripts (e.g., ChatGPT-generated Python). The process includes retrieving n and e, calculating p, q, and d, and decrypting stolen files—offering a real-world look into exploiting poor cryptographic hygiene.

Exploiting Web App with Insecure Direct Object Reference (IDOR)

Web challenges test parameter tampering. Using simple URL manipulation (note_id=1,2,3,...) without needing sophisticated tools, the speaker reveals hidden notes and flags. It highlights how simple logic flaws can lead to major data leaks in real-world web applications.

Command Injection and Netcat Listener

We test for command injection in the recipient input field. When direct output fails, a blind injection with Netcat (e.g., piping whoami to a listener on port 4545) confirms server-side code execution. The technique simulates real-world pen-testing workflows when dealing with black-box systems.

Creating a Malicious Word Document for Social Engineering

Using Metasploit, the speaker crafts a macro-enabled Word document to send from one compromised email to another target (Cipher). This demonstrates the power of phishing in compromising systems through trust exploitation, emphasizing payload stealth and listener setup.

Smart Contract Takeover and Treasury Drain

Ethereum contracts are manipulated using cast commands. By calling changeOwnership() without checks and then withdraw(), the player transfers 200 ETH to their wallet. It illustrates flawed contract design and the critical need for secure smart contract development.

Godot Game File Reversing for Hidden Flags

Game reverse engineering involves extracting Godot project files, locating score thresholds, and lowering them to reveal hidden content. By editing .gd files and rerunning the game, flags appear with minimal interaction, showing how games can hide secrets in logic or interface triggers.

AI Prompt Injection — Fooling the Assistant

Challenges with “Evil GPT” bots demonstrate social engineering of AI. By pretending to be an admin or a creator and avoiding trigger keywords like “flag,” the speaker bypasses filters to extract sensitive data. It’s a deep dive into adversarial prompting and natural language attacks on AI models.

Kernel Backdoor Analysis

In a forensic task, logs show suspicious kernel modules like spatch.ko linked to the attacker “Cipher.” By extracting hex-encoded secrets from these modules using strings and CyberChef, the flag is revealed—highlighting how even kernel-level threats leave trails if logging is thorough.

Network Forensics with NFS and Wireshark

Through Wireshark, the speaker filters NFS packets, follows TCP streams, and identifies a ZIP archive (PK header). After cracking the MD5 password with CrackStation, they recover a hidden QR code flag, demonstrating end-to-end digital forensics from packet to payload.

SQL Injection via Blind Boolean-Based Attacks

The SQLi challenge involves analyzing thousands of crafted requests with blind payloads and timing/differential responses. A Python script parses requests and correlates successful ones to uncover the correct values — modeling realistic slow, meticulous, but effective attack strategies.

TryHackMe Hackfinity Battle Encore Answers

Answers can be found here.

Video Walkthrough