Posts by Category

hackthebox

Walkthrough - Irked

This was a decent box. An IRC exploit gets you a shell with the IRC user but not the local user. There are two methods to get a privilege escalation. One is ...


Walkthrough - Curling

For all the beginners and the people who wish to nail all the machines on HackTheBox, this machine is a great starter. It has a flavor of shell upload to web...


Walkthrough - Frolic

This was a good practice of decoding stuff, web exploitation and rop exploitation. Overall a decent box and easy points. Getting user was tiring but root was...


Walkthrough - Carrier

A tricky machine. It needed a lot of network configuration learning, some RCE and patience. One of the best machines I have done yet due to its medium level ...


Walkthrough - Ethereal

This machine was absolutely insane, mind boggling and fun at the same time. It took me a lot of painful days to own this machine but eventually, hard work wi...


Walkthrough - Access

This was my first ever machine on HTB. Took me around 3 days to figure this out (I was just starting!). This box touches basic misconfiguration in Windows ba...


Walkthrough - Weak RSA

Breaking the infamous RSA algorithm. It has been the gold standard for public-key cryptography. There’s a catch though, if you implement it badly, your ciphe...


Walkthrough - You can do it!

Cryptography is an art of hiding data in plain sight. This challenge presents you with the easiest way to obfuscate your data. Visit this section to learn mo...


Walkthrough - 0ld is g0ld

This particular challenge is a good starter to your journey as a challenge solver! Take a moment to appreciate the beauty of “old” algorithms, without them w...



Back to top ↑

walkthrough

Walkthrough - Irked

This was a decent box. An IRC exploit gets you a shell with the IRC user but not the local user. There are two methods to get a privilege escalation. One is ...


Walkthrough - Curling

For all the beginners and the people who wish to nail all the machines on HackTheBox, this machine is a great starter. It has a flavor of shell upload to web...


Walkthrough - Frolic

This was a good practice of decoding stuff, web exploitation and rop exploitation. Overall a decent box and easy points. Getting user was tiring but root was...


Walkthrough - Carrier

A tricky machine. It needed a lot of network configuration learning, some RCE and patience. One of the best machines I have done yet due to its medium level ...


Walkthrough - Ethereal

This machine was absolutely insane, mind boggling and fun at the same time. It took me a lot of painful days to own this machine but eventually, hard work wi...


Walkthrough - Access

This was my first ever machine on HTB. Took me around 3 days to figure this out (I was just starting!). This box touches basic misconfiguration in Windows ba...


Walkthrough - Weak RSA

Breaking the infamous RSA algorithm. It has been the gold standard for public-key cryptography. There’s a catch though, if you implement it badly, your ciphe...


Walkthrough - You can do it!

Cryptography is an art of hiding data in plain sight. This challenge presents you with the easiest way to obfuscate your data. Visit this section to learn mo...


Walkthrough - 0ld is g0ld

This particular challenge is a good starter to your journey as a challenge solver! Take a moment to appreciate the beauty of “old” algorithms, without them w...



Back to top ↑

security essentials


Back to top ↑

tutorial


Back to top ↑