Exploiting Ansible Galaxy Vulnerabilities | HackTheBox Intuition Writeup
Introduction HackTheBox Intuition begins with a series of websites focused on document compression. There’s an authentication site,…
Introduction HackTheBox Intuition begins with a series of websites focused on document compression. There’s an authentication site,…
For this Hack the Box (HTB) machine, I utilized techniques such as enumeration, user pivoting, and privilege…
The article explains a HackTheBox challenge involving a compromised email service. It guides readers through investigating the…
In this post, we demonstrated and covered the solution to HackTheBox Runner machine which involves basic enumeration,…
In this post, we demonstrated Laravel PHP CVE-2018-15133 and conducted privilege escalation by finding stored credentials. This…
In this post, we covered the solution walkthroughs for two HackTheBox Sherlock challenges, which are, HackTheBox Campfire-1…
In this post, we covered the solution of HackTheBox Crafty machine where we showcased the exploitation of…
We covered the walkthrough of HackTheBox Surveillance where we demonstrated the exploitation of the recent vulnerability CVE-2023-41892…
Description In the race for Vitalium on Mars, the villainous Board of Arodor resorted to desperate measures,…
We covered the second part of open source intelligence case studies as part of HackTheBox OSINT track….
We covered multiple OSINT case studies and challenges from HackTheBox, namely Easy Phish, Infiltration & ID Exposed,…
We covered command injection and execution in Node JS. The scenario included an input box that passes…
We covered practical examples of bypassing domain redirection restrictions. In the first example we used a Webhook…
We covered the python pickle library and explained why it’s not secure any more. Additionally we demonstrated…
We covered analyzing a sample Microsoft office word document using oletools to extract relevant Macros and links….
We covered Server Side Template Injection vulnerability and demonstrated a practical scenario using HackTheBox Neonify web challenge….
We briefly explained command injection as one of the top 10 web application vulnerabilities. Command injection allows…
We covered an incident response scenario from HackTheBox named PersistenceIsFutile where we went over an infected Linux…
We covered local file inclusion that is a web application vulenrability. We also covered the concept of…
We covered conducting memory forensics using Volatility framework. The scenario involved a memory dump file that assumingly…