HTB Pov Writeup
Introduction I found this a very interesting machine and learned a lot about some subjects I didn’t know much about before. Exploiting viewstates was very interesting and opened my eyes to some ...
Introduction I found this a very interesting machine and learned a lot about some subjects I didn’t know much about before. Exploiting viewstates was very interesting and opened my eyes to some ...
Introduction The path to user was a good reminder that basic enumeration skills are still key.I do have to admit that this box went maybe a litle to far with it.Once you get past this part the L...
Introduction The initial access was what you would expect of an easy machine. Doing some basic enumration to then find and exploiting a known vulnerability. Getting access to root was a bit more...
Introduction This box was initially rated hard but after seeing the low amount of people solving it, and how difficult it actually was, Hack The Box decided to rate this one insane instead. The ...
Introduction Monitored was quite and interesting machine and it had a very clear theme throughout the user and root. I got to give the creator respect for sticking to the same theme being servic...
Introduction The initial access was quite unique we weren’t really exploiting a vulnerability per say but actually re-tracing the steps of a known malware sample. Which then allowed us to get co...
Introduction Devvortex was a nice and simple challenge focusing on the exploitation of a Vulnerable joomla service. The privesc required a little bit out of the box thinking as it wasn’t the way...
Introduction Surveilance was an interesting machine that made use of two publicly known exploits. These exploits did require minor modifications to work so you really needed to understand how it...
Introduction The initial access was a fairly standard file upload vulnerability however this was only the start of the entire chain. Next exploiting the docker container to then abuse the passwo...
Introduction Codify the initial access was very clear from the start but the exact execution required a bit of out of the box thinking and research work for the right keywords. After that everyt...