Introduction to Resource: In this write-up, we will explore the “Resource” machine from Hack The Box, which is categorized as a Hard difficulty challenge. This walkthrough will cover the reconnaissance, exploitation, and privilege escalation steps required to capture the flag. The objective of the Resource machine: […]
Introduction to Permx: In this write-up, we will explore the “Permx” machine from Hack The Box, categorized as an easy difficulty challenge. This walkthrough will cover the reconnaissance, exploitation, and privilege escalation steps required to capture the flag. Objective: The goal of this walkthrough is to […]
Introduction to Solarlab: This write-up will explore the “Solarlab” machine from Hack The Box, categorized as an Medium difficulty challenge. This walkthrough will cover the reconnaissance, exploitation, and privilege escalation steps required to capture the flag. Objective: The goal of this walkthrough is to complete the […]
In this post, I would like to share a walkthrough of the Usage Machine from Hack the Box This room will be considered an Easy machine on Hack the Box What will you gain from the Usage machine? For the user flag, you need to abuse blind SQL injection vulnerability in a password […]
In this post, I would like to share a walkthrough of the Iclean Machine from Hack the Box This room will be considered a Medium machine on Hack the Box What will you gain from the Iclean machine? For the user flag, you need to examine a Flask web application and […]
In this post, I would like to share a walkthrough of the Devvortex Machine from Hack the Box This room will be considered an Easy machine on Hack the Box What will you gain from the Devvortex machine? For the user flag, you will need to expose the list of users […]
In this post, I would like to share a walkthrough of the Hospital Machine from Hack the Box This room will be considered a medium machine on Hack the Box What will you gain from the Hospital machine? For the user flag, you must circumvent upload filters and deactivate functions to […]
In this post, I would like to share a walkthrough of the Builder Machine from Hack the Box This room will be considered a medium machine on Hack the Box What will you gain from the Builder machine? For the user flag, you will need to exploit a recent Jenkins vulnerability, […]
In this post, I would like to share a walkthrough of the Sandworm Machine from Hack the Box This room will be considered a medium machine on Hack the Box What will you gain from the Sandworm machine? For the user flag, you will need to find […]