Challenges: Anthem (TryHackMe)


This beginner-friendly challenge focuses on attention to detail and passive information gathering, guiding you to uncover the “keys to the castle.” You don’t need brute force — just your browser, Remote Desktop, and observation skills. After initial reconnaissance with tools like nmap
and gobuster
, you’ll explore a web server running Umbraco CMS, hunt for hidden clues in source code and public files, and gather credentials needed to access the target system.
Website Analysis
This task involves you, paying attention to details and finding the 'keys to the castle'.
This room is designed for beginners, however, everyone is welcomed to try it out!
Enjoy the Anthem.
In this room, you don't need to brute force any login page. Just your preferred browser and Remote Desktop.
Please give the box up to 5 minutes to boot and configure.
Answer the questions below
Let's run nmap and check what ports are open.
nmap -sC -sV <IP_Address>
What port is for the web server?
80
What port is for remote desktop service?
3389
Gobuster gives an hint of some paths we can check on the site:
gobuster dir -u http:// -w /usr/share/wordlists/dirb/common.txt
What is a possible password in one of the pages web crawlers check for?
UmbracoIsTheBest!
Checking
https://<Target_IP>/robots.txt
reveals the passwordUmbracoIsTheBest! # Use for all search robots User-agent: * # Define the directories not to crawl Disallow: /bin/ Disallow: /config/ Disallow: /umbraco/ Disallow: /umbraco_client/
What CMS is the website using?
Umbraco
- Umbraco, a .NET CMSWhat is the domain of the website?
anthem.com
the site
http://<TARGET_IP>
reveals the domainWhat's the name of the Administrator
Solomon Grundy
the “we are hiring” part of the site has a famous poem and the hint of the question is searching on browser.
Can we find find the email address of the administrator?
SG@anthem.com
based on the hiring email format of JD@anthem.com the administrator’s email is likely to be an abbrevation of their name too.
Spot the flags
Our beloved admin left some flags behind that we require to gather before we proceed to the next task..
Answer the questions below
Anthem are hiring!
What is flag 1?
THM{L0L_WH0_US3S_M3T4}
this flag was on the comments within the source code found when you inspect the page
What is flag 2?
THM{G!T_G00D}
the flag was also within the source code as the placeholder of. the search form
What is flag 3?
THM{L0L_WH0_D15}
I came across this flag while scrolling through some of the open paths (
http://<TARGET_IP>/authors
) on the siteWhat is flag 4?
THM{AN0TH3R_M3TA}
the last flag was also within the header section of the source code on the inspect element
Final stage
Let's get into the box using the intel we gathered.
Answer the questions below
Let's figure out the username and password to log in to the box.(The box is not on a domain)
Gain initial access to the machine, what is the contents of user.txt?
THM{N00T_NO0T}
For this we only have two ports open, 80 - http and 3389 - ms-wbt-server, the get low user access we also need to consider that we don’t have ssh or ftp as options. In this case i tried to explore the option of using the Umbraco CVE to use metasploit to get the user access but didn’t work had to eventually research further and found an option of using Windows RDP.
xfreerdp /f /u:SG /p:UmbracoIsTheBest! /v:<TARGET_IP>
when promoted whether you trust the above certificate use
T
Can we spot the admin password?
ChangeMeBaby1MoreTime
To find the file that has the admin password we need to change the file settings to show hiddens files
we’ll now be able to see backups folder that has a restore.txt file
Next we’ll open the properties of restore then switch to Security, click Edit,
After applying SG, we’ll now be able to access the restore.txt file to get Admin’s password.
Escalate your privileges to root, what is the contents of root.txt?
THM{Y0U_4R3_1337}
To escalate privileges we’ll use the password we found in previous step to access the Administrator’s files and folders. Under the Desktop we’ll find the root flag
Using the intelligence gathered from passive reconnaissance — such as hidden passwords, usernames, and CMS info — you gain initial access via RDP using valid credentials. From there, by enabling visibility of hidden files and adjusting file permissions, you uncover the admin password. This allows privilege escalation to the Administrator account, where the final root flag is retrieved. The challenge reinforces careful enumeration and lateral thinking without needing brute-force methods.
Subscribe to my newsletter
Read articles from Jebitok directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by

Jebitok
Jebitok
Software Developer | Learning Cybersecurity | Open for roles * If you're in the early stages of your career in software development (student or still looking for an entry-level role) and in need of mentorship, you can reach out to me.