All PostsTutorials & GuidesWriteups & Video Tutorials

Introductory Researching

TryHackMe Introductory Research writeup

Video Walkthrough

To make learning easier, Iโ€™ve recorded a complete video walkthrough covering every task of the TryHackMe Introductory Research writeup room.
You can watch the full walkthrough directly below:

Access TryHackMe Introductory Researching Writeup Room Access :ย Click Here

What This Writeup Is About

If youโ€™re working through the TryHackMe Introductory Research Writeup room and want a clear, complete, and beginner-friendly writeup, youโ€™re in the right place. This article walks through every task, explains the reasoning behind each answer, and shows how proper research skills are built step by step โ€” exactly what this room is designed to teach.

This writeup is also aligned with a recorded video walkthrough, making it perfect for learners who prefer both reading and watching while studying.

Why Research Skills Matter in Cybersecurity

Cybersecurity isnโ€™t about memorizing commands. Itโ€™s about figuring things out when you donโ€™t know the answer. Tools change. Vulnerabilities evolve. Attack techniques improve. But one skill stays constant: research.

Think of research like a compass. You might not know the path yet, but research always points you in the right direction.

Overview of the TryHackMe Intro to Research Room

Room Objectives of TryHackMe Introductory Research writeup

The TryHackMe Introductory Research writeup room focuses on teaching:

  • How to ask the right questions
  • How to search efficiently
  • How to identify useful tools and resources
  • How to read documentation confidently

Skills You Gain From This Room

By completing this room, you learn:

  • Google searching techniques
  • Vulnerability discovery workflows
  • Linux manual page usage
  • Practical research methodology for CTFs and real-world hacking

Taskย 1 Introduction

Without a doubt, the ability to research effectively isย theย most important quality for a hacker to have. By its very nature, hacking requires aย vastย knowledge base – because how are you supposed to break into something if you don’t know how it works? The thing is: no one knows everything. Everyone (professional or amateur, experienced or totally new to the subject) will encounter problems which they don’t automatically know how to solve. This is where research comes in, as, in the real world, you can’t ever expect to simply be handed the answers to your questions.

As your experience level increases, you will find that the things you’re researching scale in their difficulty accordingly; however, in the field of information security, there will never come a point where you don’t need to look things up.

This room will serve as a brief overview of some of the most important resources available to you, and will hopefully aid you in the process of building a research methodology that works for you.

We will be looking at the following topics:
โ€ข An example of a research question
โ€ข Vulnerability Searching tools
โ€ขย Linuxย Manual Pages

Let’s begin.

Note:answer dump “writeups” submitted for this room willย notย be accepted. The aim of the questions is to encourageresearchย – answer dumps do nothing other than invalidate the point of the room and are strongly condemned.

Answer the questions below

Read the Introduction

No answer needed

Taskย 2 Example Research Question

We’ll begin by looking at a typical research question: the kind that you’re likely to find when working through a CTF on TryHackMe like TryHackMe Introductory Research writeup.

Let’s say you’ve downloaded a JPEG image from a remote server. You suspect that there’s something hidden inside it, but how can you get it out?
How about we start by searching for โ€œhiding things inside imagesโ€ in Google:

blank

Notice that the second link down gives us the title of a technique: โ€œSteganographyโ€. You can then click that link and read the document, which will teach you how files are hidden inside images.

Ok, so we know how it’s done, let’s try searching for a way to extract files using steganography:

blank

Already virtually every link is pointing to something useful. The first link contains a collection of useful tools, the second is more instructions on how to perform steganography in the first place. Realistically any of these links could prove useful, but let’s take a look at that first one (https://0xrick.github.io/lists/stego/):

blank

The very first tool there looks to be useful. It can be used to extract embedded data from JPEG files — exactly what we need it to do! This page also tells you that steghide can be installed using something called โ€œaptโ€.
Let’s search that up next!

blank

Great — so apt is a package manager that lets us install tools on Linux distributions like Ubuntu (or Kali!).
How can we install packages using apt? Let’s search it!

blank


Perfect — right at the top of the page we’re given instructions. We know that our package is called steghide, so we can go ahead and install that:

blank

Now, let’s switch back to that collection of steganography tools we were looking at before. Did you notice that there were instructions on how to use steghide right there?

blank

There we go! That’s how we can extract an image from a file. Our research has paid off and we can now go and complete the task.

Notice the methodology here. We started with nothing, but gradually built up a picture of what we needed to do. We had a question (How can I extract data from this image). We searched for an answer to that question, then continued to query each of the answers we were given until we had a full understanding of the topic. This is a really good way to conduct research: Start with a question; get an initial understanding of the topic; then look into more advanced aspects as needed.

Now it’s your turn. See if you can answer the following questions using your research skills. The first three questions have appropriate search queries in the hints:

Answer the questions below

In the Burp Suite Program that ships with Kali Linux, what mode would you use to manually send a request (often repeating a captured request numerous times)?

Answer: Repeater

What hash format are modern Windows login passwords stored in?

Answer: NTLM

What are automated tasks called in Linux?

Answer: Cron Jobs

What number base could you use as a shorthand for base 2 (binary)?

Answer: Base 16

If a password hash starts with $6$, what format is it (Unix variant)?

Answer: sha512crypt

Taskย 3 Vulnerability Searching

Often in hacking you’ll come across software that might be open to exploitation. For example, Content Management Systems (such as WordPress, FuelCMS, Ghost, etc) are frequently used to make setting up a website easier, and many of these are vulnerable to various attacks. So where would we look if we wanted to exploit specific software?

The answer to that question lies in websites such as:

NVD keeps track of CVEs (Common Vulnerabilities and Exposures) — whether or not there is an exploit publicly available — so it’s a really good place to look if you’re researching vulnerabilities in a specific piece of software. CVEs take the form: CVE-YEAR-IDNUMBER
(Hint Hint: It’s going to be really useful in the questions!)

ExploitDB tends to be very useful for hackers, as it often actually contains exploits that can be downloaded and used straight out of the box. It tends to be one of the first stops when you encounter software in a CTF or pentest.

If you’re inclined towards the CLI on Linux, Kali comes pre-installed with a tool called “searchsploit” which allows you to search ExploitDB from your own machine. This is offline, and works using a downloaded version of the database, meaning that you already have all of the exploits already on your Kali Linux!


Let’s take an example. Say we’re playing a CTF and we come across a website:

TryHackMe Introductory Research writeup

Well, this is quite obviously FuelCMS. Usually it won’t be this obvious, but hey, we’ll work with what we’ve got!

We know the software, so let’s search for it in ExploitDB.
(Note: I’m going to use the CLI tool in Kali, as it tends to be quicker from a workflow perspective — however, you are welcome to use the website)

I’m using the command searchsploit fuel cms to search for exploits:

Searchsploit results for FuelCMS

If you prefer doing things in the website, here are the results from there:

ExploitDB results for FuelCMS

Success! We’ve got an exploit that we can now use against the website!

Actually using the exploit is outwith the scope of this room, but you can see the process. 

If you click on the title you’ll be given a bit more of an explanation about the exploit:

Information about a remote code execution in FuelCMS 1.4.1

Pay particular attention to the CVE numbers; you’ll need them for the questions!
The format will be like so: CVE-YEAR-NUMBER

Note: CVEs numbers are assigned when the vulnerability are discovered, not when they are publicised. Bear in mind that if a vulnerability is discovered at the end of a year, or if the process of confirming and rectifying the vulnerability takes a long time, then the release date might be the year after the year in the CVE date… bear this in mind when answering the following questions.

Answer the questions below

What is the CVE for the 2020 Cross-Site Scripting (XSS) vulnerability found in WPForms?

Answer: CVE-2020-10385

There was a Local Privilege Escalation vulnerability found in theย Debianย version of Apache Tomcat, back in 2016. What’s the CVE for this vulnerability?

Answer: CVE-2016-1240

What is the very first CVE found in the VLC media player?

Answer: CVE-2007-0017

If you wanted to exploit a 2020 buffer overflow in the sudo program, which CVE would you use?

Answer: CVE-2019-18634

Taskย 4 Manual Pages

If you haven’t already worked in Linux, take a look at the Linux Fundamentals module. Linux (usually Kali Linux) is without a doubt the most ubiquitous operating system used in hacking, so it pays to be familiar with it!

One of the many useful features of Linux is the inbuilt man command, which gives you access to the manual pages for most tools directly inside your terminal. Occasionally you’ll find a tool that doesn’t have a manual entry; however, this is rare. Generally speaking, when you don’t know how to use a tool, man should be your first port of call.

Let’s give this a shot!

Say we want to connect to a remote computer using SSH, but we don’t know the syntax. We can try man ssh to get the manual page for SSH:

blank

Awesome!

We can see in the description that the syntax for using SSH is <user>@<host>:

blank

We can also use the man pages to look for special switches in programs that make the program do other things. An example of this would be that (from our very first example) steghide can be used to both extract and embed files inside an image, based on the switches that you give it. 

For example, if you wanted to display the version number for SSH, you would scroll down in the man page until you found an appropriate switch:

blank

Then use it:

blank

Another way to find that switch would have been to search the man page for the correct switch using grep:

blank

Now your turn! Answer the following questions using the man command:

Answer the questions below

SCP is a tool used to copy files from one computer to another.
What switch would you use to copy an entire directory?

Answer: -r

fdisk is a command used to view and alter the partitioning scheme used on your hard drive.
What switch would you use to list the current partitions?

Answer: -l

nano is an easy-to-use text editor for Linux. There are arguably better editors (Vim, being the obvious choice); however, nano is a great one to start with.
What switch would you use to make a backup when opening a file with nano?

Answer: -B

Netcat is a basic tool used to manually send and receive network requests.ย 
Whatย commandย would you use to start netcat in listen mode, using port 12345?

Answer: nc -l -p 12345

Taskย 5 Final Thoughts

You may have been told in school that there are good sources and bad sources of information. That may be true when it comes to essays and referencing information; however, it’s my pleasure to state that it does not apply here. Any information can potentially be useful — so feel free to use blogs, wikipedia, or anything else that contains what you’re looking for! Blogs especially can often be very valuable for learning when it comes to information security, as many security researchers keep a blog.

Having completed this room, you hopefully now have established the basis of a methodology to tackle research questions that you come across by yourself. The vast majority of rooms on TryHackMe can be solved purely using knowledge found on Google, so please take the opportunity to improve your skills by Googling any problems you come across!

As a follow-up to this room, complete CMNatic’s Google Dorking room to learn some advanced Google tricks!

Answer the questions below

Research Complete!

No answer needed

Conclusion

The TryHackMe Introductory Research Writeup room isnโ€™t just a beginner task – itโ€™s a mindset shift. Once you master research, no challenge feels impossible. Whether youโ€™re solving CTFs, learning pentesting, or preparing for real-world security roles, this skill becomes your strongest weapon.

Related Resources

Frequently Asked Questions (FAQs)

1. Is TryHackMe Introductory Research writeup room suitable for beginners?

Yes, itโ€™s one of the best starting points for new TryHackMe users.

2. Do I need Linux experience before starting the TryHackMe Introductory Research writeup?

Basic familiarity helps, but the room explains concepts clearly.

3. Is this room useful beyond CTFs?

Absolutely. Research skills apply directly to real-world pentesting.

4. Why doesnโ€™t TryHackMe allow answer dumps?

Because learning research is more important than memorizing answers.

5. What room should I complete next?

CMNaticโ€™s Google Dorking room is a perfect follow-up.

Mehmood Ali

I am a Cybersecurity Consultant with over 8+ years of experience in SOC analyst, digital forensics, cloud security, network security, and incident response. With 20+ international certifications, I have successfully designed secure systems, led vulnerability assessments, and delivered key security projects. I am skilled at improving incident response times, mitigating threats, and ensuring compliance with ISO 27001 standards.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button