Advent of Cyber 2025
Event Log: Advent of Cyber 2025
Event: TryHackMe Advent of Cyber 2025 | Focus: Blue/Red Team | Duration: 24 Days | Date: Dec 2025 | Status: Completed (24/24)
📝 Event Overview
The Advent of Cyber is a 24-day capture-the-flag event covering the full spectrum of defensive and offensive security. I used this event to specifically sharpen my skills in Cloud Security (AWS), Web Exploitation, and Container Forensics.
🛠️ Key Tools Used
- Network: Wireshark, Nmap, Burp Suite
- Cloud/Infra: Docker, AWS CLI, Kubernetes
- Forensics: Splunk, Volatility
🏆 Top 3 Highlights
1. Day 14: DoorDasher’s Demise (Containers)
- Topic: Docker Misconfigurations
- Technique: Analyzed a compromised container environment. Identified privileges that allowed for interacting with the host system.
- Takeaway: Container isolation is not guaranteed. Misconfigured capabilities can easily lead to full host compromise.
2. Day 20: Race Conditions (Web)
- Topic: Web Application Logic Flaws
- Technique: Used Burp Suite (Repeater/Intruder) to send simultaneous requests, manipulating a coupon/credit system before the database could update the balance.
- Takeaway: Even secure code can be vulnerable if it doesn’t handle concurrency correctly.
3. Day 23: S3cret Santa (AWS Cloud)
- Topic: AWS S3 Enumeration
- Technique: Configured
aws-clito interact with a target bucket. Enumerated file lists and downloaded sensitive data that was improperly secured. - Takeaway: Publicly accessible S3 buckets remain a critical low-hanging fruit in cloud security assessments.
📅 Daily Log (Summary)
| Day | Category | Topic |
|---|---|---|
| 1-5 | Web & AI | Prompt Injection, IDOR, SQL Injection |
| 6-10 | Forensics | Memory Analysis, Registry Forensics, Splunk Basics |
| 11-15 | Cloud & Infra | Docker Escapes (Day 14), Azure Blob Attacks |
| 16-20 | Network/Web | Active Directory, Race Conditions (Day 20) |
| 21-24 | Red Team | C2 Beacons, Malware Analysis, AWS S3 (Day 23) |
🚀 Conclusion
This event reinforced the importance of hybrid skills. Being able to pivot from Web (Burp Suite) to Infrastructure (Docker) and Cloud (AWS) is essential for a modern Penetration Tester.