HackTheBox - Forge

Bypass SSRF filters using domain redirection and abusing Python PDB

HackTheBox - Cap

Cap starts by identifying an IDOR vulnerability on its hosted website. Using this IDOR, I can obtain …

HackTheBox - Knife

Exploiting the backdoor planted in PHP 8.1-dev

HackTheBox - Love

Love from Hack The Box hosts a voting system application and an online file scanner. The file …

HackTheBox - TheNotebook

Abusing JWT key identifier and breaking out of a Docker container

HackTheBox - Ophiuchi

Deserialization attack on YAML and reversing web assembly

HackTheBox - Traverxec

Code execution with path traversal

HackTheBox - Writeup

TIL: The staff group allows you to override binaries' executable paths.

HackTheBox - Heist

Learn how RID cycling could be used for enumerating AD users

HackTheBox - Armageddon

Pwning Drupal 7 CMS with Drupalgeddon and abusing Snap with malicious snap package

HackTheBox - Active

Finding passwords in Group Policy Preferences and roasting Kerberos

HackTheBox - Shocker

Hands on with ShellShock vulnerability

HackTheBox - Atom

Supplying a malicious update definition to Electron-updater

VulnHub - Alfa

Alfa starts with enumeration on FTP to obtain a username and an image file which named after a pet. …

VulnHub - DC-9

DC-9 from VulnHub features a website that is vulnerable to SQL injection. I’m able to dump a bunch …

VulnHub - DC-6

DC-6 starts off by enumerating usernames from a WordPress website and use a brute-force attack …

HackTheBox - Delivery

Exploiting a logic flaw called TicketTrick

HackTheBox - Ready

Turns SSRF to remote code execution and escape from a Docker container

HackTheBox - Time

Exploiting an insecure deserialization on Jackson library and how to mitigate it

HackTheBox - Doctor

Seven times seven is equal to SSTI

HackTheBox - Passage

USBCreator LPE on Linux

HackTheBox - Omni

Unauthenticated RCE as SYSTEM on Windows 10 IoT

HackTheBox - Blackfield

Abusing Backup Operators group to dump Active Directory database

HackTheBox - Worker

Learn how Azure Pipelines can be abused

HackTheBox - Buff

Tunneling with Chisel to deliver a buffer overflow exploit

HackTheBox - SneakyMailer

Example of a phishing attack and PyPI package exploitation

HackTheBox - Tabby

Abusing Tomcat manager-script roles and escalate to root with LXC container

HackTheBox - Bucket

Pentesting against simulated AWS S3 Bucket

HackTheBox - Cascade

Plundering dead Active Directory accounts

HackTheBox - APT

Enumerating network interfaces of a remote computer via MSRPC and exploit NTLMv1

HackTheBox - Nest

Nest is one of my favorite machines after Forest, I learned a lot about enumeration here, especially …

HackTheBox - Magic

SQLi for login bypass and embed webshell to an image file

HackTheBox - Sauna

Learn basic exploitation of Active Directory

HackTheBox - ServMon

Exploiting embedded system software

HackTheBox - Remote

Enumerating public NFS and gain access to sensitive files

HackTheBox - Forest

Using BloodHound to discover abusable Active Directory groups

HackTheBox - OpenAdmin

Exploiting OpenNetAdmin vulnerability and sudo nano