HackTheBox Permx Writeup
Introduction In HackTheBox PermX, we explore the Permx machine from Hack The Box (HTB), focusing on exploiting…
Introduction In HackTheBox PermX, we explore the Permx machine from Hack The Box (HTB), focusing on exploiting…
Introduction HackTheBox Abyss challenge is categorized as an Easy-level pwn challenge that revolves around exploiting a custom…
Introduction In HackTheBox No Gadgets ,we have a classic buffer overflow but with a unique twist: commonly…
Introduction In the rapidly growing field of cybersecurity, certifications like the Offensive Security Certified Professional (OSCP) have…
Introduction The Offensive Security Certified Professional (OSCP) and Hack The Box Certified Penetration Testing Specialist (CPTS) certifications…
Introduction In HackTheBox Hunting License , we need to extract three passwords from an ELF executable named…
Introduction This post covers a cryptographic HackTheBox Initialization (CTF) challenge that uses Python for encrypting messages with…
Introduction The HackTheBox SPG challenge write-up details a cryptographic CTF puzzle where users decrypt an encrypted flag…
Introduction EvilCUPS focuses on the recent CUPS vulnerabilities that gained attention in September 2024. We’ll exploit four…
Introduction The team stumbles into a long-abandoned casino. As you enter, the lights and music whir to…
Introduction A test! Getting onto the team is one thing, but you must prove your skills to…
Introduction HackTheBox IClean begins with a basic cross-site scripting (XSS) attack to steal cookies, which is followed…
Introduction HackTheBox BoardLight is a web-based challenge from HackTheBox. This challenge typically focuses on web vulnerabilities, and…
Introduction HackTheBox Computational Recruiting challenge involves a typical cryptography and pattern analysis problem. The goal is to…
Introduction Hack The Box (HTB) “Regularity” challenge is a binary exploitation task involving a 64-bit statically linked…
HackTheBox Usage begins with a blind SQL injection in a password reset form, which can be exploited…
Introduction HackTheBox Intuition begins with a series of websites focused on document compression. There’s an authentication site,…
For this Hack the Box (HTB) machine, I utilized techniques such as enumeration, user pivoting, and privilege…
The article explains a HackTheBox challenge involving a compromised email service. It guides readers through investigating the…
In this post, we demonstrated and covered the solution to HackTheBox Runner machine which involves basic enumeration,…