Open in app

Sign In

Write

Sign In

HotPlugin
HotPlugin

74 Followers

Home

About

Aug 12

Busqueda — HackTheBox

Busqueda is an easy machine from HackTheBox. It involves exploiting Arbitrary Code Injection in website using vulnerable searcher library to gain initial access, taking advantage of password reuse and abusing custom python script for privilege escalation. NMAP PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH…

Hackthebox

4 min read

Busqueda — HackTheBox
Busqueda — HackTheBox
Hackthebox

4 min read


Aug 5

Agile — HackTheBox

Agile is a medium machine from HackTheBox. It involves extracting Werkzeug debug console pin with the help of Directory traversal vulnerability, getting credentials from chrome remote debugging window, and exploiting CVE in sudoedit to modify the file used in a cron running as root. NMAP PORT STATE SERVICE REASON…

Hackthebox

7 min read

Agile — HackTheBox
Agile — HackTheBox
Hackthebox

7 min read


Jul 30

Cerberus — HackTheBox

Introduction Cerberus is a hard machine from HackTheBox. It involves exploiting File Read and RCE CVEs in icinga to get foothold, escalating privileges by LPE CVE in firejail, pivoting to DC and finally getting SYSTEM by exploiting RCE in ADSelfService Plus. NMAP PORT STATE SERVICE VERSION 8080/tcp open…

Hackthebox

7 min read

Cerberus — HackTheBox
Cerberus — HackTheBox
Hackthebox

7 min read


Jun 24

Stocker — HackTheBox

Stocker is an easy machine from HackTheBox. It involves bypassing authentication via NoSQL injection, exploiting HTML injection in PDF generation to read source code from the host containing credentials that leads to foothold. Finally, misconfigured sudo privilege allowing execution of NodeJS scripts leads to shell as root. NMAP PORT…

Hackthebox

4 min read

Stocker — HackTheBox
Stocker — HackTheBox
Hackthebox

4 min read


Jun 17

Escape — HackTheBox

Escape is a medium machine from HackTheBox. It involves enumerating smb shares and finding PDF containing SQL Server credentials, stealing NTLMv2 hash of SQL service, reading log files for credentials and finally abusing the AD CS template for getting shell as administrator. NMAP PORT STATE SERVICE…

Hackthebox

6 min read

Escape — HackTheBox
Escape — HackTheBox
Hackthebox

6 min read


Jun 11

Soccer — HackTheBox

Soccer is an easy machine from HackTheBox. It involves exploiting file upload CVE in an old version of tiny file manager, finding another running application and exploiting sqli in the vulnerable websocket leading to foothold. …

Hackthebox

6 min read

Soccer — HackTheBox
Soccer — HackTheBox
Hackthebox

6 min read


Jun 9

Metapwned — Cloud Security Challenges

These fun challenges are created and hosted by Ian Austin. You can provide your feedback on their Linkedin. Challenge 1

Ctf

3 min read

Metapwned — Cloud Security Challenges
Metapwned — Cloud Security Challenges
Ctf

3 min read


Jun 3

Bagel — HackTheBox

Bagel is a medium Linux machine from HackTheBox. It involves exploiting file read vulnerability to read the application source code, fuzzing another dotnet application’s PID to download its DLL, and reversing it to find and exploit JSON deserialization vulnerability leading to foothold on the machine. …

Hackthebox

7 min read

Bagel — HackTheBox
Bagel — HackTheBox
Hackthebox

7 min read


May 6

Flight — HackTheBox

Flight is a hard windows machine from HackTheBox. The steps to root this box include exploiting local file inclusion (LFI), leaking NTLM hashes, forced authentication (SCF/URL file attacks) and using Juicy Potato NG to get system shell. NMAP PORT STATE SERVICE…

Hackthebox

7 min read

Flight — HackTheBox
Flight — HackTheBox
Hackthebox

7 min read


Apr 29

MetaTwo — HackTheBox

MetaTwo is an easy Linux machine from HackTheBox. It involves the exploitation of SQL injection CVE in the booking press (WordPress) plugin and XXE injection in the WordPress version to read credentials from the configurations file and initial foothold. …

Hackthebox

6 min read

MetaTwo — HackTheBox
MetaTwo — HackTheBox
Hackthebox

6 min read

HotPlugin

HotPlugin

74 Followers

Learning for Fun! UwU

Following
  • Prof Bill Buchanan OBE

    Prof Bill Buchanan OBE

  • ARZ101

    ARZ101

  • Filza

    Filza

  • PentesterLab

    PentesterLab

  • assume-breach

    assume-breach

See all (25)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams