logoPwnsploit
HomeAbout UsDonate
logoPwnsploit
HomeAbout UsDonate
tryhackme

7 Dec 2025

TryHackMe: Evil-GPT V2 - AI Hacking (Full Walkthrough)

A new threat has emerged—an AI far more dangerous than Cipher. This one doesn’t just hack; it manipulates systems on a level we’ve never encountered. In this CTF walkthrough, we dive deep into its tactics, decode its behavior, and expose how it bends digital environments to its will. If you’re into AI security, advanced exploitation, and high-intensity cyber challenges, this breakdown is your next must-read.

TryHackMe: Evil-GPT V2 - AI Hacking (Full Walkthrough)
  1. Box Info
  2. Interface
  3. My Prompts
  4. Getting Flag

Box Info

We’ve got a new problem—another AI just popped up, and this one’s nothing like Cipher. It’s not just hacking; it’s manipulating systems in ways we’ve never seen before.

To connect to the target machine, navigate to the IP address using a web browser

Interface

evilgptv2 interface

My Prompts

My propmpt

Getting Flag

getting flag

and it reveals the flag

THM{AI_NOT_AI}

Similar Post

tryhackme 28 Nov 2025

TryHackMe Simple CTF

In this room, I discovered the box was susceptible to CVE-2019-9053. Exploiting this vulnerability allowed me to dump the database and crack the password for the user 'mitch'. After logging in via SSH, I enumerated the user's permissions and found 'mitch' could run vim as sudo. I utilized this GTFOBins technique to spawn a shell, successfully escalating privileges to root

TryHackMe Simple CTF
tryhackme
1 Dec 2025

TryHackMe: Padelify – From Reflected XSS to Admin Takeover via LFI and WAF Bypass

Padelify's registration page contained a reflected XSS vulnerability. By injecting a crafted payload, we hijacked a moderator’s session when they viewed the malicious registration link, gaining access to the moderator panel. There, the page parameter was vulnerable to Local File Inclusion but protected by a WAF. Using a clever bypass technique, we successfully included sensitive files and extracted the admin’s plaintext password from a configuration file. With the leaked credentials, we logged in as administrator, achieving full system compromise — all starting from a simple reflected XSS. A perfect privilege escalation chain

TryHackMe: Padelify – From Reflected XSS to Admin Takeover via LFI and WAF Bypass
tryhackme 29 Nov 2025

TryHackMe Evil-GPT

Dive into the mechanics of LLM abuse with this Evil-GPT walkthrough. Learn how prompt injection vulnerabilities exploit AI-driven systems, understand the risks, and discover essential defensive strategies to secure your own applications against unauthorized access and privilege escalation.

TryHackMe Evil-GPT
Show More