I Hacked a Bank?!!

Yomna AlShemyYomna AlShemy
2 min read

No, I didnโ€™t, please calm down LOL

I solved my first TryHackMe machine โ€” and Iโ€™m super excited to share what I learned! This challenge introduced me to the tool Gobuster, which I used to find hidden pages on a web server.

๐Ÿ›  Tool Used:

Gobuster

Gobuster is a directory brute-forcing tool. It discovers hidden files, folders, and paths on a target website by trying out a list of possible names from a wordlist.

๐Ÿ” What Was the Goal?

The goal was to discover hidden pages on the FakeBank site.

These pages might include: Admin panels User-specific pages Other sensitive or hidden endpoints

๐Ÿ“œ How Gobuster Works

It uses a wordlist (wordlist.txt) to try out different paths.

It sends requests like:

http://fakebank.thm/admin

http://fakebank.thm/secret

If the page exists, it returns an HTTP status code that tells us if: โœ… The page is accessible (200 OK), ๐Ÿšซ Itโ€™s forbidden (403), ๐Ÿ” It redirects (301/302), โŒ It doesnโ€™t exist (404)

๐Ÿ’ฅ My Key Discovery

Gobuster found the hidden path: /bank-transfer โ†’ [Status: 200 OK] That means the page exists and is accessible.

When I opened it in the browser, I found a functionality to transfer money!

๐Ÿ“ธ Screenshot

๐Ÿง  What I Learned

How directory brute-forcing works.

Why wordlists are important in web recon.

The real-life importance of HTTP status codes as indicators.

How hidden endpoints can be big security risks

๐Ÿ’ฌ Final Thoughts

๐Ÿ’ก Creating a wordlist to guess paths is genius โ€” it felt like digital treasure hunting. ๐Ÿ’ก I used to ignore status codes... now I know theyโ€™re essential clues for attackers and defenders alike!

๐Ÿš€ Whatโ€™s Next?

This is just the beginning. Iโ€™m documenting every machine I solve here in my blog and GitHub repo โ€” join me as I explore deeper into Red Teaming and web security!

See ya in the next machine! ๐Ÿ”“๐Ÿ’ป

1
Subscribe to my newsletter

Read articles from Yomna AlShemy directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Yomna AlShemy
Yomna AlShemy

Hi! I'm Yomna, a cybersecurity absolute beginner, and a computer science fresh grad! I'm super excited to document my journey through write-ups, lessons learned, or documentations. Walk through with me and hopefully we would learn something together.