3 Jun, 2023 Hack The Box: Bagel Machine Walkthrough – Medium Difficulty Medium Machine BurpSuite, Challenges, DLL, dnspy, dotnet, HackTheBox, Linux, Local File Inclusion, Penetration Testing, Python, ssh, SSH key
13 May, 2023 Hack The Box: Interface Machine Walkthrough – Medium Difficulty Medium Machine API, BurpSuite, Challenges, dompdf, ffuf, HackTheBox, Linux, Penetration Testing, PHP, pspy64, python3
23 Apr, 2023 Hack The Box: Investigation Machine Walkthrough – Medium Difficulty Medium Machine BurpSuite, Challenges, exiftool, HackTheBox, Linux, Outlook, Penetration Testing, pspy64, Python, upload, Windows Event Log
15 Apr, 2023 Hack The Box: Encoding Machine – Medium Difficulty Medium Machine API, BurpSuite, Challenges, curl, disearch, git, git-dumper, gobuster, HackTheBox, Linux, Penetration Testing, PHP, php_filter_chain_generator, pwncat-cs, python3
9 Apr, 2023 Hack The Box: Broscience Machine Walkthrough-Medium Difficulty Medium Machine bash, BurpSuite, Challenges, command injection, gobuster, HackTheBox, hashes, john the ripper, Linux, openssl, Path Injection, Penetration Testing, PHP, pspy64, psql, pwncat-cs
11 Mar, 2023 Hack The Box: Mentor Machine Walkthrough – Medium Difficulty Medium Machine API, BurpSuite, Challenges, chisel, gobuster, HackTheBox, john the ripper, json, linpeas, Linux, Penetration Testing, psql, pwncat-cs, Python, snmpwalk, ssh, sudo, wfuzz
26 Feb, 2023 Hack The Box: Awkward Machine Walkthrough – Medium Difficulty Medium Machine API, BurpSuite, cart, Challenges, cookie, crackstation, csv file, curl, file read, gobuster, gtfobins, HackTheBox, john the ripper, jwt, jwt2john, Penetration Testing, pspy64, pwncat-cs, python3, ssh, ssrf
29 Jan, 2023 Hack The Box: Ambassador Machine Walkthrough – Medium Difficulty Medium Machine arbitrary file read, Challenges, curl, directory traversal, git, grafana, HackTheBox, Linux, MySQL, mysql database, Penetration Testing, python3
22 Jan, 2023 Hack The Box: (UpDown) Upload Phar File for RCE Medium Machine Challenges, HackTheBox, Penetration Testing, Vulnerabilities