HackTheBox - Secret

Secret starts with analyzing web source to recover a secret token from older commit. The secret is …

HackTheBox - Driver

Driver is also one of the machines listed in the HTB printer exploitation track. It starts with a …

HackTheBox - BountyHunter

BountyHunter features a website that is vulnerable to XXE attack. Exploiting it allows me to …

HackTheBox - Nunchucks

SSTI in Nunjucks and SUID capability on Perl

HackTheBox - Explore

Exploiting ES File Explorer and abusing ADB

HackTheBox - Return

Return is another machine listed in the HTB printer exploitation track. This machine hosts a web …

HackTheBox - Antique

Antique is one of the machines listed in the HTB printer exploitation track. It features a network …

HackTheBox - Cap

Cap starts by identifying an IDOR vulnerability on its hosted website. Using this IDOR, I can obtain …

HackTheBox - Validation

Second-order SQL injection

HackTheBox - Knife

Exploiting the backdoor planted in PHP 8.1-dev

HackTheBox - Love

Love from Hack The Box hosts a voting system application and an online file scanner. The file …

HackTheBox - TheNotebook

Abusing JWT key identifier and breaking out of a Docker container

HackTheBox - Traverxec

Code execution with path traversal

HackTheBox - Writeup

TIL: The staff group allows you to override binaries' executable paths.

HackTheBox - Heist

Learn how RID cycling could be used for enumerating AD users

HackTheBox - Armageddon

Pwning Drupal 7 CMS with Drupalgeddon and abusing Snap with malicious snap package

HackTheBox - Active

Finding passwords in Group Policy Preferences and roasting Kerberos

HackTheBox - Shocker

Hands on with ShellShock vulnerability

HackTheBox - Atom

Supplying a malicious update definition to Electron-updater

HackTheBox - Spectra

Getting password from automatic login script of ChromeOS

HackTheBox - ScriptKiddie

Exploiting exploitation tools and command injection in a log file

HackTheBox - Delivery

Exploiting a logic flaw called TicketTrick

HackTheBox - Doctor

Seven times seven is equal to SSTI

HackTheBox - Omni

Unauthenticated RCE as SYSTEM on Windows 10 IoT

HackTheBox - Buff

Tunneling with Chisel to deliver a buffer overflow exploit

HackTheBox - Laboratory

LFI to RCE on GitLab 12.8.1~12.9.0

HackTheBox - Nest

Nest is one of my favorite machines after Forest, I learned a lot about enumeration here, especially …

HackTheBox - Sauna

Learn basic exploitation of Active Directory

HackTheBox - ServMon

Exploiting embedded system software

HackTheBox - Remote

Enumerating public NFS and gain access to sensitive files

HackTheBox - Forest

Using BloodHound to discover abusable Active Directory groups

HackTheBox - OpenAdmin

Exploiting OpenNetAdmin vulnerability and sudo nano