Gotta Catch'em All! is a easy room in Tryhackme which is based on the pokemon series. The objective is to get the pokemon flags.

| Author | GhostlyPy |
| Description | This room is based on the original Pokemon series. Can you obtain all the Pokemon in this room? |
Deploy the VM and lets go.
Enumeration
Let’s start with a nmap scan.
I checked the http service and I noticed the logo for the apache2 was missing.
So, I checked the source page and found this.
I tried this credentials for the ssh service and it worked.
Grass flag
After logging into ssh I found a zip file in the dir /Desktop.
I unzipped the file.
unzip file-name.zip
After reading the file inside the inflated directory I found that it is hex encoded.
I decoded it using cyberchef.
That’ll give the answer to the first question.
Water flag
Following the first flag, I figured the naming pattern and just used locate to get the flags location.
locate water-type.txt
Again, I used cyberchef to decode the text but this time it was rot13 cipher with a key of 14.

Fire flag
Again, I used the same locate command to get the location of the flag.
I used the command line base64 tool to decode the text.
echo "base64-content" | base64 -d
Roots flag
I had no luck with the locate command this time. So, I manually searched through the directories. And finally, I found this file which had the password for the user ash.
Then I changed the user to ash.
su ash
I found the roots flag in the /home directory.
Viola!! We got all the flags.
That’s it folks. Happy hacking!!!