Walkthrough - Irked
This was a decent box. An IRC exploit gets you a shell with the IRC user but not the local user. There are two methods to get a privilege escalation. One is ...
This was a decent box. An IRC exploit gets you a shell with the IRC user but not the local user. There are two methods to get a privilege escalation. One is ...
For all the beginners and the people who wish to nail all the machines on HackTheBox, this machine is a great starter. It has a flavor of shell upload to web...
This was a good practice of decoding stuff, web exploitation and rop exploitation. Overall a decent box and easy points. Getting user was tiring but root was...
A tricky machine. It needed a lot of network configuration learning, some RCE and patience. One of the best machines I have done yet due to its medium level ...
This machine was absolutely insane, mind boggling and fun at the same time. It took me a lot of painful days to own this machine but eventually, hard work wi...
This was my first ever machine on HTB. Took me around 3 days to figure this out (I was just starting!). This box touches basic misconfiguration in Windows ba...
This was a decent box. An IRC exploit gets you a shell with the IRC user but not the local user. There are two methods to get a privilege escalation. One is ...
For all the beginners and the people who wish to nail all the machines on HackTheBox, this machine is a great starter. It has a flavor of shell upload to web...
This was a good practice of decoding stuff, web exploitation and rop exploitation. Overall a decent box and easy points. Getting user was tiring but root was...
This was my first ever machine on HTB. Took me around 3 days to figure this out (I was just starting!). This box touches basic misconfiguration in Windows ba...
This was a decent box. An IRC exploit gets you a shell with the IRC user but not the local user. There are two methods to get a privilege escalation. One is ...
For all the beginners and the people who wish to nail all the machines on HackTheBox, this machine is a great starter. It has a flavor of shell upload to web...
This was a good practice of decoding stuff, web exploitation and rop exploitation. Overall a decent box and easy points. Getting user was tiring but root was...
A tricky machine. It needed a lot of network configuration learning, some RCE and patience. One of the best machines I have done yet due to its medium level ...
Breaking the infamous RSA algorithm. It has been the gold standard for public-key cryptography. There’s a catch though, if you implement it badly, your ciphe...
Cryptography is an art of hiding data in plain sight. This challenge presents you with the easiest way to obfuscate your data. Visit this section to learn mo...
This particular challenge is a good starter to your journey as a challenge solver! Take a moment to appreciate the beauty of “old” algorithms, without them w...
Breaking the infamous RSA algorithm. It has been the gold standard for public-key cryptography. There’s a catch though, if you implement it badly, your ciphe...
Cryptography is an art of hiding data in plain sight. This challenge presents you with the easiest way to obfuscate your data. Visit this section to learn mo...
This machine was absolutely insane, mind boggling and fun at the same time. It took me a lot of painful days to own this machine but eventually, hard work wi...
This was my first ever machine on HTB. Took me around 3 days to figure this out (I was just starting!). This box touches basic misconfiguration in Windows ba...
This particular challenge is a good starter to your journey as a challenge solver! Take a moment to appreciate the beauty of “old” algorithms, without them w...
This machine was absolutely insane, mind boggling and fun at the same time. It took me a lot of painful days to own this machine but eventually, hard work wi...
A tricky machine. It needed a lot of network configuration learning, some RCE and patience. One of the best machines I have done yet due to its medium level ...
Enumeration of any system, host or application is very important before you try your tools and run amok on it. In this post I will talk about two very import...
Enumeration of any system, host or application is very important before you try your tools and run amok on it. In this post I will talk about two very import...
Enumeration of any system, host or application is very important before you try your tools and run amok on it. In this post I will talk about two very import...
Enumeration of any system, host or application is very important before you try your tools and run amok on it. In this post I will talk about two very import...
Enumeration of any system, host or application is very important before you try your tools and run amok on it. In this post I will talk about two very import...