Introduction to Greenhorn: In this write-up, we will explore the “Greenhorn” machine from Hack The Box, categorized as an easy difficulty challenge. This walkthrough will cover the reconnaissance, exploitation, and privilege escalation steps required to capture the flag. Objective: The goal of this walkthrough is to […]
Introduction to Permx: In this write-up, we will explore the “Permx” machine from Hack The Box, categorized as an easy difficulty challenge. This walkthrough will cover the reconnaissance, exploitation, and privilege escalation steps required to capture the flag. Objective: The goal of this walkthrough is to […]
Introduction to Editorial: In this write-up, we will explore the “Editorial” machine from Hack The Box, categorized as an easy difficulty challenge. This walkthrough will cover the reconnaissance, exploitation, and privilege escalation steps required to capture the flag. Objective: The goal of this walkthrough is to […]
Introduction to Boardlight: In this write-up, we will explore the “Boardlight” machine from Hack The Box, categorized as an easy difficulty challenge. This walkthrough will cover the reconnaissance, exploitation, and privilege escalation steps required to capture the flag. Objective: The goal of this walkthrough is to […]
Introduction to Mailing: In this write-up, we will explore the “Mailing” machine from Hack the Box, categorized as an easy difficulty challenge. This walkthrough will cover the reconnaissance, exploitation, and privilege escalation steps required to capture the flag. Objective: The goal of this walkthrough is to […]
In this post, I would like to share a walkthrough of the Usage Machine from Hack the Box This room will be considered an Easy machine on Hack the Box What will you gain from the Usage machine? For the user flag, you need to abuse blind SQL injection vulnerability in a password […]
In this post, I would like to share a walkthrough of the Headless Machine from Hack the Box This room will be considered an Easy machine on Hack the Box What will you gain from the Headless machine? For the user flag, you need to exploit a Cross-Site Scripting (XSS) vulnerability, […]
In this post, I would like to share a walkthrough of the Perfection Machine from Hack the Box This room will be considered an Easy machine on Hack the Box What will you gain from the Perfection machine? For the user flag, you need to abuse the vulnerability that identified was […]
In this post, I would like to share a walkthrough of the Crafty Machine from Hack the Box This room will be considered an Easy machine on Hack the Box What will you gain from the Crafty machine? For the user flag, you must exploit a Minecraft server, which is particularly […]
In this post, I would like to share a walkthrough of the Bizness Machine from Hack the Box This room will be considered an Easy machine on Hack the Box What will you gain from the Bizness machine? For the user flag, you will need to exploit CVE-2023-49070, an authentication bypass […]