0xnhl

Back

THM AOC25 Sidequest1

Created: 1/12/2026 Updated: 1/12/2026

Creds
mcskidy : AoC2025!
eddi_knapp : S0mething1Sc0ming

hint from day 1 : Once you have the final flag, use it to unlock the hidden png. Where is it? That’s a .secret!


root@tbfc-web01:/home/mcskidy/Documents$ cat read-me-please.txt


in ~/.bashrc
export PASSFRAG1=“3ast3r”

in eddi_knapp@tbfc-web01:~/.secret_git$
git log
git checkout d12875c8b62e089320880b9b7e41d6765818af3d
cat secret_note.txt
PASSFRAG2: -1s-

eddi_knapp@tbfc-web01:~$ cat Pictures/.easter_egg

PASSFRAG3: c0M1nG

Passcode: 3ast3r-1s-c0M1nG


root@tbfc-web01:/home/eddi_knapp/Documents$ gpg —output mcskidy —decrypt mcskidy_note.txt.gpg

root@tbfc-web01:/home/eddi_knapp/Documents$ cat mcskidy


Follow above instructions and visit the webpage to get ciphertext : http://10.48.172.161:8080/

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
plaintext

root@tbfc-web01:~$ openssl enc -d -aes-256-cbc -pbkdf2 -iter 200000 -salt -base64 -in website_output.txt -out decoded_message.txt -pass pass:‘91J6X7R4FQ9TQPM9JX2Q9X2Z’

root@tbfc-web01:~$ cat decoded_message.txt

Well done — the glitch is fixed. Amazing job going the extra mile and saving the site. Take this flag THM{w3lcome_2_A0c_2025}

NEXT STEP:
If you fancy something a little...spicier....use the FLAG you just obtained as the passphrase to unlock:
/home/eddi_knapp/.secret/dir

That hidden directory has been archived and encrypted with the FLAG.
Inside it you'll find the sidequest key.

plaintext

root@tbfc-web01:/home/eddi_knapp/.secret$ gpg —output dir.tar.gz —decrypt dir.tar.gz.gpg
give passphrase and youl get decrypted dir.tar.gz

root@tbfc-web01:/home/eddi_knapp/.secret$ tar xvzf dir.tar.gz
dir/
dir/sq1.png

from local machine:

 scp eddi_knapp@10.48.172.161:~/.secret/dir/sq1.png ~/temp
plaintext


secret key to access https://tryhackme.com/room/sq1-aoc2025-FzPnrt2SAu
go to http://10.48.145.171:21337/
and enter : now_you_see_me


nmap 10.48.145.171
Starting Nmap 7.92 ( https://nmap.org ) at 2025-12-13 22:48 +03
Nmap scan report for 10.48.145.171
Host is up (0.14s latency).
Not shown: 994 closed tcp ports (conn-refused)
PORT      STATE    SERVICE
22/tcp    open     ssh
80/tcp    open     http
8000/tcp  open     http-alt
8080/tcp  open     http-proxy
9001/tcp  open     tor-orport
32769/tcp filtered filenet-rpc

Nmap done: 1 IP address (1 host up) scanned in 17.42 seconds
plaintext

Also 13400, 13401, 13402, 13403, 13404


access the control panel at http://10.48.145.171:8080/

paste in console

document.getElementById('loginWindow').style.display = 'none';
document.getElementById('mapScreen').style.display = 'block';
plaintext

Pressing the key on ‘Cells/Storage’, you get flag1 : THM{h0pp1ing_m4d}