Access was a quick and fun box where we had to look for credentials in an Access database then use the credentials to decrypt a PST file. Kali Linux has some tools that let us read those two file t...
Zipper was a cool box that mixed some enumeration, API usage and a priv esc using a SUID binary. I had some problems at first getting into Zabbix when I found a possible username but didnโt think o...
Giddy from Hack the Box is being retired this week so Iโll go over the steps to pwn this box. For this one we need to find an easy SQL injection point in the web application then leverage this to t...
Ypuffy is being retired this weekend, so itโs time to do another writeup. I think this is the only OpenBSD machine so far on Hack the Box. The initial user part was not really difficult and involve...
This blog post is a writeup of the Hack the Box SecNotes machine from 0xdf.
Windows / 10.10.10.97
Summary
The box runs a PHP application on an IIS server.
There is a 2nd order SQL injecti...
This blog post is a writeup of the Mischief machine from Hack the Box using the unintended LXC container privesc method.
Linux / 10.10.10.92
Summary
SNMP is enabled and the default public ...
Linux / 10.10.10.87
This blog post is a writeup of the Waldo machine from Hack the Box.
Summary
The webserver has a vulnerable function that can be used to browse directories and read file...
Windows / 10.10.10.100
This blog post is a writeup for Active from Hack the Box.
Summary
Thereโs a GPP file with user credentials on the replication share of the DC which we can can crack ...
Linux / 10.10.10.102
This blog post is a quick writeup of Hawk from Hack the Box.
Summary
The server is running an FTP server, a Drupal website and an H2 database (which is not accessible ...
Linux / 10.10.10.89
This blog post is a writeup of the excellent Hack the Box machine created by dzonerzy.
Summary
The webserver used is vulnerable to a path traversal bug and buffer overfl...