Categories
Tags
#HackTheBox Active_Directory ADCS bloodhound brotli certificates certipy certipy_ad COM constrained_delegations Cross-Session-Relay CVE-2023-46818 CVE-2023-47268 CVE-2024-32651 CVE-2024-34716 CVE-2024-6886 CVE-2024-9264 CVE-2025-24071 DCOM decompiling_dll Defender delegation_admins dll Docker dpapi easy elpscrk ESC1 ESC16 fscan FTP Git git-dumper Gitea grafana HackTheBox hard idor IIS IIS_KERBEROS_AUTH Insane ISPConfig keepass kerberos kerbrute KioskMode linux Log_Analysis machine Medium MySQL OXID-Resolver pbkdf2-sha256 phishing PrusaSlicer RBCD RCE rid_bruteforcing S4U2Proxy S4U2Self shadow_credentials SMB SQLite SSTI U2U UAC_Bypass Velociraptor VeraCrypt Windows windows_internals WSL xss
HTB X VulnLab: VulnEscape (Windows/Easy)
VulnEscape is an Easy Difficulty Windows machine where users exploit a Remote Desktop Server to connect as KioskUser0, bypass restrictions using Microsoft Edge, and uncover a password to gain admin access and capture the root flag.
841 words
|
4 minutes
Cross-Session DCOM-Relay attack
This blog post explains cross-session relay attacks, covering COM/DCOM basics and authentication flaws. It details how attackers exploit weak configurations to relay credentials.
1320 words
|
7 minutes

HTB X Vulnlab: Shibuya (Windows/HARD)
2025-08-05
Shibuya is a hard Windows machine that requires extensive enumeration across multiple services and accounts. The attack chain involves exploiting exposed protocols, credential discovery, and lateral movement. Privilege escalation is achieved through abusing Active Directory Certificate Services.
2291 words
|
11 minutes
HTB: Cat (Linux/Medium)
Cat is a medium-difficulty Linux machine featuring a custom PHP web application vulnerable to XSS, which allows cookie hijacking and privilege escalation. A SQL injection in a SQLite database enables remote code execution and access to internal logs, which leak plaintext credentials. These are used to access a vulnerable Gitea instance (CVE-2024-6886), ultimately leading to the discovery of root credentials in a private repository.
1679 words
|
8 minutes
HTB: Titanic (Linux/Easy)
Titanic is an easy Linux machine with a booking site and a Gitea instance. An arbitrary file read vulnerability allows access to Gitea's SQLite database, leading to cracked SSH credentials. A scheduled script using a vulnerable magick binary (CVE-2024-41817) is exploited for root access.
708 words
|
4 minutes
HTB: Cicada (Windows/Easy)
Cicada is an excellent beginner-friendly Windows box designed for those new to Windows pentesting, without requiring any knowledge of Active Directory or its attack vectors and strategies. It focuses on the early stages of enumeration, which are essential for tackling more advanced machines, as well as some basic manual checks you can perform once you obtain a user shell.
984 words
|
5 minutes
HTB: DarkCorp (Windows/Insane)
This is an insane Windows machine with one of the largest attack surfaces I’ve ever encountered on a single target. One could even argue that it deserves to be published as an Endgame or perhaps even a mini Pro Lab.
75 words
|
1 minutes
HTB: Trickster (Linux/Medium)
2025-02-01
"Trickster" is a medium-difficulty Linux machine on HackTheBox that challenges you with technologies like Git, MySQL, Docker, and vulnerabilities such as SSTI and CSRF. This write-up covers the key steps and techniques I used to exploit the machine, highlighting the creative enumeration and exploitation required to capture the flags.
1999 words
|
10 minutes
