TryHackMe Takeover – Easy Subdomain Takeover Walkthrough
Lab Name: TakeOver
Platform: TryHackMe
Difficulty: Easy
Topic: Subdomain Enumeration & Subdomain Takeover
Overview
The TakeOver room on TryHackMe is an easy challenge that focuses on subdomain enumeration and identifying a subdomain takeover vulnerability. The lab mainly revolves around discovering hidden subdomains and analyzing SSL/TLS certificate data to uncover sensitive information.
Subdomain Enumeration
Initially, I tried using subfinder, but it did not return any useful results for this lab.
So, I switched to ffuf along with the SecLists wordlist.
Tool Used
👉 ffuf
👉 SecLists
GitHub repository
👉 (subdomains-top1million-5000.txt)
ffuf Command
Discovered Subdomains
👉 blog.futurevera.thm
👉 support.futurevera.thm
Update /etc/hosts File
To access the discovered subdomains, add them to the hosts file.
SSL/TLS Certificate Analysis
There is an SSL/TLS certificate issue when accessing the subdomains using OpenSSL.
To bypass this, we can analyze the certificate using Nmap’s ssl-cert script.
Nmap Commands
Interesting Finding
From the SSL certificate, the Subject Alternative Name (SAN) revealed:
Finding the Flag
Open the discovered subdomain in the browser or use curl.
Using Browser
This redirects to:
Using curl
Response
🎉 Flag Successfully Retrieved!
Conclusion
This lab is a great introduction to:
This lab is a great
introduction to:
👉 Subdomain fuzzing
👉 Virtual host discovery
👉 SSL certificate
enumeration
👉 Real-world subdomain
takeover concepts
Highly recommended for beginners in web exploitation and bug bounty hunting 🚀



