TECHNICAL HTB Pilgrimage Walkthrough Search for flags using tools like nmap and ImageMagick, identify vulnerabilities, exploit them, find user credentials, and capture flags. Happy hacking the box!
HTB Jupiter Walkthrough Discover how temporary files can provide information for getting access to a Jupyter notebook.
HTB Ambassador Walkthrough Discover how using an access token can allow breaking into a development server.
HTB Timelapse Walkthrough I solved the hack-the-box for a Windows machine that was giving me problems. This is how I solved it to get the admin password.
TECHNICAL Rhysida Ransomware Malware Analysis - Part 2: How to Decrypt In the second part of our malware analysis walkthrough of Rhysida ransomware, we will pick up where we left off from part 1 (analysis and debugging) and explore how to decrypt the ransomware.
Rhysida ransomware Malware Analysis - Part 1: Dynamic analysis This article is very different from one of my classic HTB walkthroughs. Driven by one of my greatest passions and by the recent articles of another Secjuice author, fairycn, whom I thank for his detailed series of articles on malware analysis and secprentice that gave the idea about the malware's
TECHNICAL HTB Photobomb Walkthrough Explore this step-by-step Hack The Box walkthrough on exploiting vulnerabilities to gain unauthorized access to a system.
TECHNICAL HTB UpDown Walkthrough Explore how Andy From Italy tackles the Hack The Box UpDown challenge, a Linux-based machine featuring exposed SSH and Apache servers.
TECHNICAL Featured HTB Shared Walkthrough Andy From Italy gives a complete step-by-step guide on the Hack The Box Shared Walkthrough.
TECHNICAL HTB Inject Walkthrough Learn how to execute a path traversal attack on a web server and do much more naughty stuff with the retired HTB Inject BOX!
CTF Featured Can an AI win a CTF? ChatGPT vs HTB! Can ChatGPT outsmart a CTF challenge? Dive into security researcher Andy From Italy's journey to uncover the AI's potential against Hack the Box!
TECHNICAL HTB Investigation Walkthrough Explore the world of reverse engineering with our HTB Investigation Walkthrough, as we navigate layered security and unveil critical cyber strategies, from masterful enumeration to deft privilege escalation.
TECHNICAL HTB Noter Walkthrough Master the art of flask cookie forging and exploit the power of MySQL in this comprehensive Hack The Box Noter Walkthrough.
TECHNICAL AP Faker: Arduino project The purpose of this educational project is to create a fake Access Point that can blend in alongside a public Access Point.
TECHNICAL HTB Trick Walkthrough A technical walk through of the HackTheBox TRICK challenge by Andy from Italy.
TECHNICAL HTB Shibboleth Walkthrough A technical walkthrough of the HackTheBox SHIBBOLETH challenge from the King of HTB Andy From Italy.
TECHNICAL HTB Late Walkthrough A technical walkthrough of the HackTheBox LATE challenge from the King of HTB Andy From Italy.
HTB Meta Walkthrough A technical walkthrough of the HackTheBox META challenge from the King of HTB Andy From Italy.
HTB Secret Walkthrough A technical walkthrough of the HackTheBox SECRET challenge from the King of HTB Andy From Italy.
TECHNICAL HTB OpenSource Walkthrough Andy From Italy is back with another epic HackTheBox walkthrough, this time he takes on the OpenSource box.
TECHNICAL HTB RouterSpace Walkthrough Andy from Italy is back with another HackTheBox technical writeup, this time he takes on the Routerspace.
TECHNICAL HTB Undetected Walkthrough A technical walkthrough of the HackTheBox undetected challenge, by Andy From Italy.