
Get ready for Advent of Cyber 2025 with the “Advent of Cyber Prep Track”, a series of 🔥 warm-up tasks designed to help beginners build confidence and get fully prepared for this year’s event!
https://tryhackme.com/room/adventofcyberpreptrack
This year is our biggest and best prize draw yet, with over $150,000 worth of prizes!
In this event, the number of rooms you complete really matters! For each room completed, you’ll receive a raffle ticket. The more raffle tickets you collect, the higher your chances of winning big!
Here are the prizes up for grabs:

Electronics & Gadgets:
🖥️ 5 × MacBook Air M4
📱 3 × iPhone 17
🎧 15 × Apple AirPods 4
🖥️ 10 × Samsung Curved Monitors
🎹 10 × Ornata Gaming Keyboards with Chroma RGB Backlighting
🛠️ 10 × Flipper Zeros
🖥️ 10 × Raspberry Pi Compute Module 5 IO Board
🐍 20 × HAK5 Rubber Ducky
Event & Experience Prizes:
🎟️ 3 × DefCon Tickets
🎓 3 × Sponsored Cyber Bootcamps
Subscriptions & Certifications:
💻 500 × THM Subscriptions (1 Month)
💻 300 × THM Subscriptions (3 Months)
💻 100 × THM Subscriptions (6 Months)
💻 80 × THM Subscriptions (12 Months)
🎁 250 × TryHackMe Swag Gift Cards ($10)
🎁 200 × TryHackMe Swag Gift Cards ($20)
🎁 100 × TryHackMe Swag Gift Cards ($50)
🎁 80 × TryHackMe Swag Gift Cards ($75)
🎁 20 × TryHackMe Swag Gift Cards ($100)
🛡️ 5 × BurpSuite 6-Month Subscriptions
🛡️ 100 × BurpSuite Web Security Certifications
🛡️ 10 × AWS & Azure Cloud Licenses
📜 100 × SAL1 Certifications
📜 100 × PT1 Certifications
Breaking any of the following rules will result in elimination from the event:
.tryhackme.com and the OpenVPN server are off-limits to probing, scanning, or exploitingTo qualify for the main prizes, you must complete the rooms in the Advent of Cyber 2025 event, starting with Day 1. Only room completions in the Advent of Cyber 2025 roadmap will qualify you for the raffle.
Finally, if you complete every room in the event, you will earn a certificate of completion! As your name will be included on the certificate, we advise ensuring your full name is set (and updated) in your profile.

The snow has started falling in Wareville, home of The Best Festival Company (TBFC). The team is preparing for SOCMAS, the annual cyber celebration, but something’s not right. Systems are glitching, passwords are failing, and McSkidy suspects something is afoot. This name keeps coming up: King Malhare. What could it mean?
Before joining the SOCMAS Response Team, you can complete 10 short missions to ensure you are ready. Each one teaches an essential cyber security skill and uncovers clues to help get you ready for Advent of Cyber 2025.

As you log into your new TBFC workstation, an alert pops up:
“Weak passwords detected on 73 TBFC accounts!”
Even McSkidy’s password, P@ssw0rd123, has been flagged. Before gaining full access, you’ll need to prove your password prowess.
Strong passwords are one of the simplest yet most effective defences against cyber attacks.
Objective:
Create a password that passes all system checks and isn’t found in the leaked password list.
Steps:
What’s the flag?
✅ THM{StrongStart}

https://github.com/ritheachengkh/secure_password/blob/main/secure_password.py


A shiny USB labelled “SOCMAS Party Playlist” appears on your desk. Inside is a mysterious file called chocolate.exe.
It looks festive, but who sent it?
In this challenge, you’ll scan the file using a simulated VirusTotal tool to decide whether it’s safe or malicious. Checking suspicious files is a crucial skill for every defender.
Objective:
Determine if chocolate.exe is safe or infected.
Steps:
What’s the flag?
✅ THM{NotSoSweet}


You step into TBFC’s AttackBox, a secure virtual environment built for training. The system hums quietly, waiting for your first command.
This is where defenders learn, break, and rebuild safely. Getting comfortable with the command line is your first step toward cyber mastery.
Objective:
Find and read the hidden welcome message inside your AttackBox.
Steps:
ls to list files.cd challenges/ to change directories.cat welcome.txt to read the text file.What’s the flag?
✅ THM{Ready2Hack}


McSkidy’s workstation shows signs of tampering, suspicious files moved, logs wiped, and a strange folder named mystery_data.
It’s time to use the Windows Command Prompt to uncover what’s hidden. Learning these commands helps you investigate systems and find what the GUI can’t.
Objective:
Find the hidden flag file using Windows commands.
Steps:
dir to list visible files.dir /a to reveal hidden ones.type hidden_flag.txt to read the flag.What’s the flag?
✅ THM{WhereIsMcSkidy}


TBFC’s delivery drones are glitching, dropping eggs instead of presents! McSkidy’s last login came from a Linux server, and something in his account might explain why.
Linux powers most servers worldwide, and knowing how to search within it is a must for any defender.
Objective:
Locate McSkidy’s hidden message in his Linux home directory.
Steps:
cd /home/mcskidy/ to enter his folder.ls -la to show all files.cat .secret_message to reveal the flag.What’s the flag?
✅ THM{TrustNoBunny}


Rumours swirl that TBFC’s data has been leaked. Emails are bouncing, and the staff are panicking. McSkidy suspects his account might have been part of a breach.
Defenders often use tools like Have I Been Pwned to check for compromised accounts. Early detection can stop an attack from spreading.
Objective:
Check if McSkidy’s email has appeared in a breach.
Steps:
mcskidy@tbfc.com into the breach checker.What’s the flag?
✅ THM{LeakedAndFound}


The TBFC drones are looping endlessly over Wareville Square. Someone logged into the company router using default credentials!
Securing WiFi is critical. Default passwords are like leaving the front gate wide open.
Objective:
Log into the router and secure it with a strong new password.
Steps:
admin and password admin.What’s the flag?
✅ THM{NoMoreDefault}


McSkidy’s social account has gone rogue, posting strange messages about “EASTMAS.” A suspicious third party app may be behind it.
Learning to review and manage app permissions helps stop data leaks before they start.
Objective:
Find and remove the malicious connected app.
Steps:
What’s the flag?
✅ THM{AppTrapped}


TBFC’s AI assistant, FestiveBot, was meant to help write cheerful emails, but it’s been spilling secrets. Some messages reveal internal URLs and even passwords.
AI tools can be powerful, but defenders must know how to prevent them from oversharing.
Objective:
Identify which chatbot messages contain sensitive information.
Steps:
What’s the flag?
✅ THM{DontFeedTheBot}




SOCMAS web servers are showing heavy traffic, but one log entry stands out: “User Agent: BunnyOS/1.0 (HopSecBot)”
Someone or something has infiltrated the system.
User Agent strings help defenders spot automated or suspicious visitors in network logs.
Objective:
Find the unusual User Agent in the HTTP log.
Steps:
What’s the flag?
✅ THM{EastmasIsComing}


Well done for making your way through Advent of Cyber 2025’s Prep Track! These mini challenges have been designed to familiarise you with some of the key tricks and tools you’ll need at your disposal to help save SOC-mas in this year’s event. If you’re looking to start your cyber security journey, there’s no better place to do it than with us, as we take you on a tour of topics from Linux CLI to Prompt Injection, getting you up to speed with the world of cyber and all, while earning chances to win some of our amazing prizes in our annual AoC giveaway!
