WhiteRabbit - HTB
Full walkthrough of WhiteRabbit HTB box involving vhost enumeration, SQLi via HMAC signature spoofing, restic backup abuse, reverse engineering a password generator, and privilege escalation to root.
Full walkthrough of WhiteRabbit HTB box involving vhost enumeration, SQLi via HMAC signature spoofing, restic backup abuse, reverse engineering a password generator, and privilege escalation to root.
Full Domain Compromise via DPAPI Credential Theft and AD Dump
Initial access with user credentials, SPN abuse via targetedKerberoast, GMSA password read, cross-user escalation, account takeover, and final domain compromise through restored cert_admin and Certificate Request Agent abuse.
Compromising a matchmaking webapp through CrushFTP auth bypass and chaining Erlang's remote shell for privilege escalation.
A brutal, multi-layered HTB box featuring Cypher injection, Docker abuse, custom CA phishing, Kafka RCE, and FreeIPA misconfigurations—culminating in full domain compromise.
Full Active Directory exploitation on Rusty Key from initial access to domain admin. Includes SPN cracking, AddSelf abuse, group removals from Protected Objects, password resets via bloodyAD, DLL hijack via writable CLSID, and final ESC8 attack for Administrator access.
Active Directory attack chain on Puppy involving BloodHound analysis, GenericWrite abuse, KeePass file cracking, and credential manager extraction
Enumeration of a Next.js application leads to sensitive information disclosure and misuse of Terraform for privilege escalation.
Initial access via admin credentials, exploit of vulnerable Grafana service, enumeration of Docker and environment variables for credentials, privilege escalation via crontab and SUID shell.
nitial foothold via Roundcube exploit, user access through decrypted IMAP creds, and root via sudo misconfiguration in below.
Windows AD lab with misconfigurations across DNS, LDAP, and certificate services, leading to full domain compromise.
From XSS to cookie theft, LFI for secrets, then abusing ImageMagick injection and a custom backup utility for root.
A university portal with weak authentication and insecure web features leads to account takeover, chained into exploiting a vulnerable PHP library and misconfigured Apache setup for full compromise.
Initial access via SMB creds, BloodHound enumeration, NTLMv2 cracking, shadow credentials, and Administrator via certificate abuse.
Compromised Expressway HTB from VPN user to root via IKEv1 PSK and Sudo privilege escalation
Blind RCE through a custom file reader and AV evasion attempts via binary replacement.
Initial foothold via broken remember-me parameter, preprod environment bypass, PHP webshell upload, GPG decryption for credentials, and privesc through sudo BASH_ENV bypass.
A misconfigured content system where user access leads to unexpected control.
An Active Directory–based pentest scenario involving MSSQL pivoting, Kerberos abuse, and privilege escalation via CVE-2024-30085.
Initial access via █████ RCE on web app → SSH as █████ (cracked creds) → npbackup-cli → root
A web-focused HTB box leveraging SQL injection, and an exposed Cobbler XML-RPC API—leading to a chained privilege escalation and root access.
Web-to-root HTB box featuring a ZIP upload bypass with null-byte injection, credential harvesting, shadow credential attack, AD CS exploitation via SeManageVolume abuse, and full domain takeover through forged certificates.
Exploitation of a WordPress and Grafana setup via leaked credentials, JWT abuse on a custom APK API, and command injection in a vulnerable /send-image endpoint to gain root access.
An Easy-rated HTB box exploiting TensorFlow deserialization RCE to gain initial access, followed by backup abuse, password cracking, and Restic misconfig for full root compromise.