INFOSEC SecjuiceCON 2025 SecjuiceCON, our first virtual conference, will be held on March 30, 2025, starting at noon America/New_York timezone.
HTB Escape Walkthrough A very specific Windows machine, in which I found myself stuck, persistently searching for an exploit that later revealed itself to be a straightforward clue that facilitated a trivial privilege escalation. The subsequent privilege escalation led me to the desired root flag.
TECHNICAL HTB Stocker Walkthrough Simple BOX on both flags, much more root than the user, still fun and great for beginners.
TECHNICAL HTB Busqueda Walkthrough A nice and simple BOX with two relatively simple exploits even for beginners.
TECHNICAL HTB PC Walkthrough Let’s talk about another relatively simple BOX. It starts unusually, but it quickly reveals its true nature: simplicity. Let’s avoid unnecessary descriptions.
TECHNICAL HTB Topology Walkthrough This box is incredibly intriguing, especially the first part. However, the search for the appropriate exploit proved to be quite challenging. It required a more sophisticated user flag than the root flag.
TECHNICAL HTB Keeper Walkthrough A simple yet intriguing BOX that piqued my interest for personal reasons this time. Apart from a few minor unexpected hiccups, I successfully cracked it with straightforward steps that are accessible to even beginners. An excellent BOX for learning.
TECHNICAL HTB Analytics Walkthrough The BOX is a great starting point for beginners, especially those who are new to the field. It’s easy to use and execute, apart from a few minor issues that don’t affect its simplicity.
TECHNICAL HTB Outdated Walkthrough This Windows Box is incredibly intriguing, featuring challenging passages and an unstable machine. Despite these difficulties, it’s an enjoyable experience with numerous exploits available.
TECHNICAL HTB MetaTwo Walkthrough A simple box with a user flag is slightly more intricate than the root flag, yet it still challenges the patience and resilience of a penetration tester.
TECHNICAL Featured Infostealers: An Overview We’ll dive into the sneaky world of infostealers, malware that steals your secrets like a ninja!
INFOSEC The CMMC Countdown, Part 4 This high-level review of the five-point controls required for a conditional certificate will wrap up the CMMC action plan.
TECHNICAL HTB Socket Walkthrough Learn how a vulnerability in a WebSocket application was discovered and exploited using SQL injection.
OSINT Featured Using Newly Surfaced Data Breaches for OSINT Research Data Breach Search Engines (DBSEs) collect and organize leaked information from data breaches, enabling OSINT investigators to access it.
INFOSEC The CMMC Countdown: The Action Plan, Part 3 Continue your CMMC action plan with this high-level review of the five-point controls required to get a conditional certificate.
TECHNICAL HTB Precious Walkthrough Learn how to hack the box with this simple, vulnerable box. A simple nmap scan reveals a web page converter with a vulnerability in the pdfkit tool.
TECHNICAL HTB Soccer Walkthrough Learn how to break into a soccer portal using vulnerabilities in the Tiny File Manager hidden route.
TECHNICAL HTB MonitorsTwo Walkthrough Learn how to exploit a vulnerable Catci instance in this hack the box post.
INFOSEC Featured SecjuiceCON 2025 Come and host a talk at SecjuiceCON, our very first virtual conference! Submit your speaker presentation abstract by December 31, 2024.
INFOSEC The CMMC Countdown: The Action Plan, Part 2 Start your CMMC action plan with this high-level review of the five-point controls required to get a conditional certificate.
MALWARE Understanding the Black Basta Ransomware Service Learn how Black Basta’s double extortion tactics works.
TECHNICAL Age Verification: An Analysis of its Effectiveness & Risks Age verification laws have been suddenly rolling out in the USA. In this article, we will navigate through a complex analysis, as I seek to stimulate your thoughts rather than impose conclusions. Today's discussion centers on age verification protocols implemented on pornography websites.
OSINT Political Donations - OSINT Explore tools like FEC, Open Secrets, and state databases to research individual political donations and donor details easily.
TECHNICAL HTB Pilgrimage Walkthrough Search for flags using tools like nmap and ImageMagick, identify vulnerabilities, exploit them, find user credentials, and capture flags. Happy hacking the box!