Categories
Tags
#HackTheBox Active_Directory ADCS bloodhound brotli certificates certipy certipy_ad COM constrained_delegations Cross-Session-Relay CVE-2023-46818 CVE-2023-47268 CVE-2024-32651 CVE-2024-34716 CVE-2024-6886 CVE-2024-9264 CVE-2025-24071 DCOM decompiling_dll Defender delegation_admins dll Docker easy elpscrk ESC1 ESC16 fscan FTP Git git-dumper Gitea grafana HackTheBox hard idor IIS IIS_KERBEROS_AUTH Insane ISPConfig keepass kerberos kerbrute KioskMode linux Log_Analysis machine Medium MySQL OXID-Resolver pbkdf2-sha256 phishing PrusaSlicer RBCD RCE rid_bruteforcing S4U2Proxy S4U2Self shadow_credentials SMB SQLite SSTI U2U UAC_Bypass Velociraptor VeraCrypt Windows windows_internals WSL xss
HTB: Puppy (Windows/Medium)
Puppy is another amazing assumed breach active directory box.
899 words
|
4 minutes
HTB: Planning (Linux/Easy)
Planning is an easy Linux machine where web enumeration and a CVE-2024-9264 vulnerability lead to initial access, lateral movement, and full system compromise.
475 words
|
2 minutes
HTB: Fluffy (Windows/Easy)
2025-09-20
Fluffy is an easy Windows machine where initial credentials and CVE-2025-24071 lead to further user access, Active Directory enumeration, and ultimately Administrator compromise.
1132 words
|
6 minutes
HTB: Delegate (Windows/Medium)
The compromise starts with exposed credentials and gradually escalates through misconfigurations in delegation and authentication, ultimately leading to full domain compromise.
875 words
|
4 minutes
HTB X Vulnlab: Phantom (Phantom/Medium) W S0nG0ku
2025-08-22
Phantom is a Medium AD box where SMB enumeration leads to a decrypted VeraCrypt container, recovered credentials enable a foothold via password spraying, and Resource-Based Constrained Delegation (RBCD) is exploited to gain Administrator access.
1513 words
|
8 minutes
HTB: Nocturnal (Linux/Easy)
On Nocturnal, an IDOR exposed credentials that unlocked the admin panel and source code. A command injection led to a shell, cracked database hashes enabled SSH access, and exploiting ISPConfig CVE-2023-46818 provided root.
684 words
|
3 minutes
HTB X Vulnlab: LustrousTwo(Windows/Hard)
2025-08-09
LustrousTwo is a hard HackTheBox Windows machine where I use FTP to gather usernames, then spray with kerbrute and elpscrk to access an IIS site with Kerberos (IIS_KERBEROS_AUTH). By decompiling DLLs and abusing S4U2Proxy constrained_delegations, I achieve RCE and escalate via a Velociraptor server key.
2502 words
|
13 minutes
HTB X VulnLab: VulnEscape (Windows/Easy)
VulnEscape is an Easy Difficulty Windows machine where users exploit a Remote Desktop Server to connect as KioskUser0, bypass restrictions using Microsoft Edge, and uncover a password to gain admin access and capture the root flag.
841 words
|
4 minutes
