HackTheBox Sp00ky Theme Writeup & Walkthrough
The HackTheBox Sp00ky Theme challenge walks you through how dangerous it can be when template engines in…
The HackTheBox Sp00ky Theme challenge walks you through how dangerous it can be when template engines in…
Introduction to HackTheBox Event Horizon Phishing attack against the CEOWe begin by explaining the background of the…
Introduction to HackTheBox Greenhorn HackTheBox Greenhorn is categorized as an easy HackTheBox machine, but achieving root access…
Introduction to HackTheBox alphascii clashing Designed for beginners, HackTheBox Alphascii Clashing is a very-easy-level challenge that offers…
Introduction to HackTheBox Armaxis The “Armaxis” challenge from the HackTheBox University CTF 2024 involves exploiting vulnerabilities in…
Introduction to HackTheBox APT In this article, we covered various aspects of Active Directory Penetration Testing using…
Introduction This post walks through a digital forensics challenge where a slow-running PC is suspected to be…
Introduction HackTheBox MagicGardens Writeup details the exploitation of a Django-based web application. We demonstrate how to identify…
Introduction This post walks through the HackTheBox Yummy machine, showcasing multiple vulnerabilities that must be chained together…
Introduction The HackTheBox Cicada machine is a Windows-based challenge focusing on Active Directory exploitation. This walkthrough demonstrates…
Introduction HackTheBox Spookifier presents a web application designed to generate spooky versions of user-provided names. However, the…
Introduction In HackTheBox Flag Command, we ffectively used enumeration, DevTools, and JavaScript analysis to bypass the normal…
Introduction In HackTheBox Strutted, we begin by identifying an Apache Struts vulnerability through enumeration. By crafting a…
Introduction In this article walk-through, we covered reverse engineering an executable file with Ollydbg to reveal the…
Introduction HackTheBox Brevi Moduli is a relatively simple challenge. The player needs to complete five rounds to…
Introduction This video is a step-by-step tutorial on exploiting the Optimum machine from Hack The Box (HTB)….
Introduction This post is a detailed walkthrough of a simulated cybersecurity incident investigation in a Security Operations…
Introduction HackTheBox Sea machine is a medium-difficulty Linux box that challenges users to exploit a vulnerable web…
Introduction HackTheBox Reaper involves analyzing an NTLM relay attack, where an attacker operates within the network to…
Introduction Hackthebox analytics begins with a webserver running a Metabase instance. A pre-authentication Remote Code Execution (RCE)…