HTB Escape Walkthrough A very specific Windows machine, in which I found myself stuck, persistently searching for an exploit that later revealed itself to be a straightforward clue that facilitated a trivial privilege escalation. The subsequent privilege escalation led me to the desired root flag.
TECHNICAL HTB Stocker Walkthrough Simple BOX on both flags, much more root than the user, still fun and great for beginners.
TECHNICAL HTB Busqueda Walkthrough A nice and simple BOX with two relatively simple exploits even for beginners.
TECHNICAL HTB PC Walkthrough Let’s talk about another relatively simple BOX. It starts unusually, but it quickly reveals its true nature: simplicity. Let’s avoid unnecessary descriptions.
TECHNICAL HTB Topology Walkthrough This box is incredibly intriguing, especially the first part. However, the search for the appropriate exploit proved to be quite challenging. It required a more sophisticated user flag than the root flag.
TECHNICAL HTB Keeper Walkthrough A simple yet intriguing BOX that piqued my interest for personal reasons this time. Apart from a few minor unexpected hiccups, I successfully cracked it with straightforward steps that are accessible to even beginners. An excellent BOX for learning.
TECHNICAL HTB Analytics Walkthrough The BOX is a great starting point for beginners, especially those who are new to the field. It’s easy to use and execute, apart from a few minor issues that don’t affect its simplicity.
TECHNICAL HTB Outdated Walkthrough This Windows Box is incredibly intriguing, featuring challenging passages and an unstable machine. Despite these difficulties, it’s an enjoyable experience with numerous exploits available.
TECHNICAL HTB MetaTwo Walkthrough A simple box with a user flag is slightly more intricate than the root flag, yet it still challenges the patience and resilience of a penetration tester.
TECHNICAL HTB Socket Walkthrough Learn how a vulnerability in a WebSocket application was discovered and exploited using SQL injection.
TECHNICAL HTB Precious Walkthrough Learn how to hack the box with this simple, vulnerable box. A simple nmap scan reveals a web page converter with a vulnerability in the pdfkit tool.
TECHNICAL HTB Soccer Walkthrough Learn how to break into a soccer portal using vulnerabilities in the Tiny File Manager hidden route.
TECHNICAL HTB MonitorsTwo Walkthrough Learn how to exploit a vulnerable Catci instance in this hack the box post.
TECHNICAL HTB Pilgrimage Walkthrough Search for flags using tools like nmap and ImageMagick, identify vulnerabilities, exploit them, find user credentials, and capture flags. Happy hacking the box!
HTB Jupiter Walkthrough Discover how temporary files can provide information for getting access to a Jupyter notebook.
HTB Ambassador Walkthrough Discover how using an access token can allow breaking into a development server.
HTB Timelapse Walkthrough I solved the hack-the-box for a Windows machine that was giving me problems. This is how I solved it to get the admin password.
TECHNICAL Rhysida Ransomware Malware Analysis - Part 2: How to Decrypt In the second part of our malware analysis walkthrough of Rhysida ransomware, we will pick up where we left off from part 1 (analysis and debugging) and explore how to decrypt the ransomware.
Rhysida ransomware Malware Analysis - Part 1: Dynamic analysis This article is very different from one of my classic HTB walkthroughs. Driven by one of my greatest passions and by the recent articles of another Secjuice author, fairycn, whom I thank for his detailed series of articles on malware analysis and secprentice that gave the idea about the malware's
TECHNICAL HTB Photobomb Walkthrough Explore this step-by-step Hack The Box walkthrough on exploiting vulnerabilities to gain unauthorized access to a system.
TECHNICAL HTB UpDown Walkthrough Explore how Andy From Italy tackles the Hack The Box UpDown challenge, a Linux-based machine featuring exposed SSH and Apache servers.