Introduction to Blurry: In this write-up, we will explore the “Blurry” machine from Hack the Box, which is categorized as a medium-difficulty challenge. This walkthrough will cover the reconnaissance, exploitation, and privilege escalation steps required to capture the flag. Objective: The goal of this walkthrough is […]
Introduction to EvilCups: This write-up will explore the “EvilCups” machine from Hack The Box, categorized as a Medium-difficulty challenge. This walkthrough will cover the reconnaissance, exploitation, and privilege escalation steps required to capture the flag. Objective: The goal of this walkthrough is to complete the “Evilcups” […]
Introduction to Solarlab: This write-up will explore the “Solarlab” machine from Hack The Box, categorized as an Medium difficulty challenge. This walkthrough will cover the reconnaissance, exploitation, and privilege escalation steps required to capture the flag. Objective: The goal of this walkthrough is to complete the […]
Introduction to Runner: This walkthrough will explore the “Runner” machine from Hack the Box, categorized as a Hard difficulty challenge. This walkthrough will cover the reconnaissance, exploitation, and privilege escalation steps required to capture the flag. Objective: The goal of this walkthrough is to complete the “Runner” […]
In this post, I would like to share a walkthrough of the Iclean Machine from Hack the Box This room will be considered a Medium machine on Hack the Box What will you gain from the Iclean machine? For the user flag, you need to examine a Flask web application and […]
In this post, I would like to share a walkthrough of the WifineticTwo Machine from Hack the Box This room will be considered a Medium machine on Hack the Box What will you gain from the WifineticTwo machine? For the user flag, you need to play around with proxy server redirects […]
In this post, I would like to share a walkthrough of the Jab Machine from Hack the Box This room will be considered a medium machine on Hack the Box What will you gain from the Jab machine? For the user flag, you need to gain access to a Jabber/XMPP server […]
In this post, I would like to share a walkthrough of the Monitored Machine from Hack the Box This room will be considered a Medium machine on Hack the Box What will you gain from the Monitored machine? For the user flag, you will need to abuse the Nagios XI software, […]
In this post, I would like to share a walkthrough of the Surveillance Machine from Hack the Box This room will be considered a medium machine on Hack the Box What will you gain from the Surveillance machine? For the user flag, you must encompass vulnerabilities characterized by detailed descriptions but […]