Tutorials on ethical hacking and hacking techniques
Writeup for retired Hack the Box machine, OpenAdmin.
Guide to retired Hack the Box machine, Chaos. Lot's of steps involving some password bruteforcing using Burp Intruder and an interesting exploitation of LaTeX.
I finally found a few spare moments to brush off some of the cobwebs and have a go at the retired Hack the Box machine, Lightweight. It contains some interesting techniques involving LDAP, tcpdump and linux file capabilities.
Probably the easiest machine on Hack the Box ever; which also means this will be the shortest writeup ever too.
I'm a bit late to the party on this one, but as the box has some interesting techniques involving XXE and a python pickle RCE vulnerability, I figured I would write it up just for my own notes.
Next up in my series of guides to retired Hack the Box machines, is my writeup of Sunday. This is listed as a 20 point box so it should be quite simple, however there were a couple of trolling moments in the course of exploiting it.
This post details the epic journey undertaken to meet with the ancient greek gods, represented here by the retired Hack the Box machine, Olympus.
Today's writeup details the steps taken to own retired Hack the Box machine, Poison. There's some interesting techniques in this one, so hopefully it will make for an interesting read.
This is my writeup of retired Hack the Box machine, Stratosphere. An interesting box, with more than a few rabbit holes that need avoiding.
A full guide to the Hack the Box machine, Aragog.
Today's writeup is for retired Hack the Box machine, Nibbles. A fairly simple machine so this won't be a long post.
In this writeup we look at the retired Hack the Box machine, Chatterbox. This is a pretty unstable box with many filtered ports, so the nmap scan needs a little tweak otherwise it will take hours to complete and the shell choice needs to be carefully made.
A fun box, with a few twists and turns, will hopefully make for an interesting writeup. This is my guide to retired Hack the Box machine, Crimestoppers.
As my last guide was unexpectedly popular, I figured I should get on and write another one; this time for Hack the Box retired machine, Lame.
My writeup of how to compromise the retired Hack the Box machine, Beep.
Once the shiny glow of getting that first reverse shell on your target has faded, you will likely need to transfer further files to the machine in order to elevate your privileges. This post details various methods to get your files where they need to go.
This post is a guide to the retired Hack the Box system, Shocker. Taking us through initial enumeration, all the way through to gaining a root shell.