Introduction to Mailing: In this write-up, we will explore the “Mailing” machine from Hack the Box, categorized as an easy difficulty challenge. This walkthrough will cover the reconnaissance, exploitation, and privilege escalation steps required to capture the flag. Objective: The goal of this walkthrough is to […]
Introduction to Skyfall: This write-up will explore the “Skyfall” machine from Hack the Box, categorized as an easy difficulty challenge. This walkthrough will cover the reconnaissance, exploitation, and privilege escalation steps required to capture the flag. Objective: The goal of this walkthrough is to complete the […]
Introduction to Runner: This walkthrough will explore the “Runner” machine from Hack the Box, categorized as a Hard difficulty challenge. This walkthrough will cover the reconnaissance, exploitation, and privilege escalation steps required to capture the flag. Objective: The goal of this walkthrough is to complete the “Runner” […]
Introduction to Formulax: This walkthrough will explore the “Formulax” machine from Hack the Box, categorized as a Hard difficulty challenge. This walkthrough will cover the reconnaissance, exploitation, and privilege escalation steps required to capture the flag. Objective: The goal of this walkthrough is to complete the […]
In this post, I would like to share a walkthrough of the Usage Machine from Hack the Box This room will be considered an Easy machine on Hack the Box What will you gain from the Usage machine? For the user flag, you need to abuse blind SQL injection vulnerability in a password […]
In this post, I would like to share a walkthrough of the Iclean Machine from Hack the Box This room will be considered a Medium machine on Hack the Box What will you gain from the Iclean machine? For the user flag, you need to examine a Flask web application and […]
In this post, I would like to share a walkthrough of the Headless Machine from Hack the Box This room will be considered an Easy machine on Hack the Box What will you gain from the Headless machine? For the user flag, you need to exploit a Cross-Site Scripting (XSS) vulnerability, […]
In this post, I would like to share a walkthrough of the Corporate Machine from Hack the Box This room will be considered an Insane machine on Hack the Box What will you gain from the Corporate machine? For the user flag, you need to abuse a complex XSS attack that […]
In this post, I would like to share a walkthrough of the Office Machine from Hack the Box This room will be considered a Hard machine on Hack the Box What will you gain from the Office machine? For the user flag, you need to look at the Joomla instance that […]
In this post, I would like to share a walkthrough of the Crafty Machine from Hack the Box This room will be considered an Easy machine on Hack the Box What will you gain from the Crafty machine? For the user flag, you must exploit a Minecraft server, which is particularly […]