HTB: Puppy (Windows/Medium)
Puppy is another amazing assumed breach active directory box.
899 words
|
4 minutes
Cover Image of the Post
HTB: Planning (Linux/Easy)
Planning is an easy Linux machine where web enumeration and a CVE-2024-9264 vulnerability lead to initial access, lateral movement, and full system compromise.
475 words
|
2 minutes
Cover Image of the Post
HTB: Fluffy (Windows/Easy)
Fluffy is an easy Windows machine where initial credentials and CVE-2025-24071 lead to further user access, Active Directory enumeration, and ultimately Administrator compromise.
1132 words
|
6 minutes
Cover Image of the Post
HTB: Delegate (Windows/Medium)
The compromise starts with exposed credentials and gradually escalates through misconfigurations in delegation and authentication, ultimately leading to full domain compromise.
875 words
|
4 minutes
Cover Image of the Post
HTB X Vulnlab: Phantom (Phantom/Medium) W S0nG0ku
Phantom is a Medium AD box where SMB enumeration leads to a decrypted VeraCrypt container, recovered credentials enable a foothold via password spraying, and Resource-Based Constrained Delegation (RBCD) is exploited to gain Administrator access.
1513 words
|
8 minutes
Cover Image of the Post
HTB: Nocturnal (Linux/Easy)
On Nocturnal, an IDOR exposed credentials that unlocked the admin panel and source code. A command injection led to a shell, cracked database hashes enabled SSH access, and exploiting ISPConfig CVE-2023-46818 provided root.
684 words
|
3 minutes
Cover Image of the Post
HTB X Vulnlab: LustrousTwo(Windows/Hard)
LustrousTwo is a hard HackTheBox Windows machine where I use FTP to gather usernames, then spray with kerbrute and elpscrk to access an IIS site with Kerberos (IIS_KERBEROS_AUTH). By decompiling DLLs and abusing S4U2Proxy constrained_delegations, I achieve RCE and escalate via a Velociraptor server key.
2502 words
|
13 minutes
Cover Image of the Post
HTB X VulnLab: VulnEscape (Windows/Easy)
VulnEscape is an Easy Difficulty Windows machine where users exploit a Remote Desktop Server to connect as KioskUser0, bypass restrictions using Microsoft Edge, and uncover a password to gain admin access and capture the root flag.
841 words
|
4 minutes
Cover Image of the Post
1
2