Skip to content

szmpns/HackTheBox-Writeups

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 

Repository files navigation

Machines

Machine Name Operating System Tools Used Skills Learned
Lame Linux Nmap, FTP, SearchSploit, Metasploit, smbclient Identifying vulnerable services, Exploiting Samba
Mirai Linux Nmap, Gobuster, SSH, df, strings Identifying an IoT device, Forensic file recovery
Active Windows Nmap, smbclient, gpp-decrypt, Impacket, John the Ripper, Metasploit SMB enumeration techniques, Group Policy Preferences enumeration and exploitation, Identification and exploitation of Kerberoastable accounts
PermX Linux Nmap, Ffuf, cURL, Git, Netcat, MySQL, SSH, openssl Leveraged Chamilo CVE-2023-4220 for remote code execution, Exploited ACL misconfiguration with a symbolic link to modify /etc/passwd and gain root access
BoardLight Linux Nmap, Ffuf, Netcat, Git, Python3, SSH, Bash Dolibarr Exploitation, SUID Exploitation
GreenHorn Linux TBA This machine is still active. The writeup will be available once the machine is retired.
Blue Windows Nmap, smbclient, crackmapexec, SearchSploit, Metasploit Identifying Windows targets using SMB, Exploit modification
Legacy Windows Nmap, crackmapexec, SearchSploit, Metasploit Identifying vulnerable services, Exploiting SMB
Cap Linux Nmap, WireShark, FTP, SSH, Python, Wget, LINpeas IDOR, Exploiting Linux capabilities
Jerry Windows Nmap, Python3, Metasploit, MSFVenom, Netcat Tomcat exploitation using multiple approaches, Writing scripts to brute-force credentials, Custom war file payload creation
Netmon Windows Nmap, FTP, Metasploit Exploiting PRTG Network Monitor
Keeper Linux Nmap, SSH, Git, SCP, Python3, KeePassXC, PuTTYgen Identifying vulnerabilities in Request Tracker, KeePass exploitation
Knife Linux Nmap, Wappalyzer, cURL, Git, Python3, Netcat, GTFOBins Identifying vulnerabilities in specific version of PHP and exploiting a backdoor for remote code execution (RCE), Utilizing the knife command for privilege escalation
Bashed Linux Nmap, Gobuster, phpbash, Python, Netcat Web shell exploitation by leveraging a pre-existing shell(phpbash), Privilege escalation through script modification and scheduled root execution
Chemistry Linux TBA This machine is still active. The writeup will be available once the machine is retired.
Sau Linux Nmap, Git, Bash, Python3, Netcat, GTFOBins SSRF exploitation using CVE-2023-27163, privilege escalation via systemctl using CVE-2023-26604

Starting Point

Machine Name Operating System Tools Used Skills Learned
Meow Linux ping, Nmap, Telnet Performing port scanning and service identification using Nmap, Exploiting Telnet
Fawn Linux Nmap, FTP Exploiting anonymous FTP login
Dancing Windows Nmap, smbclient Enumerating SMB shares
Redeemer Linux Nmap, redis-cli Interacting with and enumerating a Redis server
Explosion Windows Nmap, xfreerdp Connecting to a remote desktop using xfreerdp
Preignition Linux Nmap, Gobuster Performing directory brute-forcing using Gobuster, Identifying and exploiting default web credentials
Mongod Linux Nmap, mongo Connecting to and interacting with a MongoDB instance
Synced Linux Nmap, rsync Enumerating and downloading files from rsync shares
Appointment Linux Nmap, BurpSuite Performing SQL injection attack
Sequel Linux Nmap, MySQL Interacting with a MySQL database using MySQL CLI
Crocodile Linux Nmap, FTP, Gobuster Gaining access to a system by combining FTP enumeration and directory brute-forcing
Responder Windows Nmap, Responder, John the Ripper, evil-winrm Exploiting Local File Inclusion (LFI) vulnerabilities, Capturing and cracking NTLMv2 hashes
Three Linux Nmap, WFuzz, awscli Discovering and interacting with S3 buckets, Uploading and executing a PHP webshell
Ignition Linux Nmap, Gobuster, BurpSuite Brute-forcing admin login credentials, Discovering hidden directories
Bike Linux Nmap, Wappalyzer, BurpSuite Exploiting Server-Side Template Injection (SSTI) vulnerabilities, Using Node.js globals to execute arbitrary system commands on the server
Funnel Linux Nmap, FTP, SSH, psql SSH tunneling (local port forwarding), Interacting with a PostgreSQL database
Pennyworth Linux Nmap, BurpSuite, Netcat Brute-forcing login credentials, Establishing a reverse shell
Tactics Windows Nmap, smbclient Enumerating and extracting files from SMB shares
Archetype Windows Nmap, smbclient, Impacket (mssqlclient), PowerShell, Wget, Netcat, WinPEAS Exploiting Microsoft SQL Server vulnerabilities, Using WinPEAS for privilege escalation
Oopsie Linux Nmap, DirBuster, Gobuster, Netcat, SSH Cookie manipulation, Exploiting SUID binaries and PATH manipulation for root access
Vaccine Linux Nmap, FTP, John the Ripper, Hashcat, SQLmap, Netcat, vi Password cracking with John the Ripper and Hashcat, Exploiting SQL injection vulnerabilities with SQLmap, Privilege escalation through configuration modification in pg_hba.conf and shell execution via vi
Unified Linux Nmap, BurpSuite, tcpdump, rogue-jndi, Netcat, mkpasswd, mongo, SSH Exploiting JNDI injection vulnerabilities in Java applications, Interacting with MongoDB to retrieve and manipulate user credentials
Included Linux Nmap, cURL, TFTP, Netcat, lxc, Wget, Git, Python3 Local File Inclusion (LFI) exploitation, LXD container privilege escalation
Markup Windows Nmap, BurpSuite, SSH, PowerShell, Wget, Python3, Netcat XXE (XML External Entity) vulnerability exploitation, User privilege escalation using Windows services and scripts
Base Linux Nmap, strings, BurpSuite, Gobuster, Netcat, SSH, find Bypassing authentication by manipulating request parameters, Finding file paths and utilizing LFI (Local File Inclusion) to access sensitive files, Privilege escalation through misconfigured binaries using find command to gain root access

About

My writeups for various Hack The Box challenges, detailing step-by-step solutions.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published