HTB Rebound Writeup
Introduction This machine was one of the hardest I’ve done so far but I learned so much from it. This Active Directory based machine combined a lot of common attacks within these environments wi...
Introduction This machine was one of the hardest I’ve done so far but I learned so much from it. This Active Directory based machine combined a lot of common attacks within these environments wi...
Introduction Analytics was a text book easy machine,To solve it you need to identify and abuse two publicly known vulnerabilities. The initial access costed me a little bit more time because of ...
Introduction This machine was a fun active directory based machine, Both the initial access and privilege escalation are common paths. THe privilege escalation was for me really interesting sinc...
Introduction Appsanity was as the name suggest a box that focussed heavily on abusing application. Initial access, lateral movement and privilege escalation were all related to abusing an applic...
Introduction Cozyhosting was a fairly easy machine to solve if you did your enumeration right. It thought some of the basic directory enumeration tacticis as well as basic command injection tech...
Introduction The initial access was quite interesting since it was abusing a known persitence mechanism used by threat actors. It required a little bit of setting up but once you got everything ...
Introduction The initial access of the application was a bit refreshing. Hack the box machines don’t often go for Insecure Direct Object References as initial access. never the less i would say ...
Introduction The initial access of this machine is abusing a very common issue in larger environments. There is always one or two devices that didn’t have their default credentials changed. The ...
Introduction RegistryTwo was the first insane box that I ever did, and boy was it a wild ride. Getting user access took me a long time to figure out. In the end I learned a lot about Java RMI an...
Introduction Clicker was an interesting application where you could find some source code on an open NFS share. During my years as a penetration tester i’ve found many open NFS shares present wi...