Blurry - Hack The Box
The blurry machine shows a vulnerability in ClearML, a development suite for ML/DL. It is classified with a medium difficulty.
deserialization privilege-escalation clearml reverse-shellThe blurry machine shows a vulnerability in ClearML, a development suite for ML/DL. It is classified with a medium difficulty.
deserialization privilege-escalation clearml reverse-shellThe Drive machine is a hard Linux system that needs reverse engineering, and performing a SQL injection on a binary.
reverse-engineering ghidra sql-injectionThis system is exploited, after some fuzzing, through a Tomcat manager with path traversal that makes the typical WAR shell a bit more difficult, and lateral movement is performed, as well as privilege escalation, through ansible misconfigurations.
fuzzing Tomcat ansibleSpider is a complex machine with two SSTI vulnerabilities, and a really interesting method to get cookies with its private key. To escalate privileges we take advantage of the fact that we are allowed to enter input in an XML file, of which a parameter is displayed in a web service.
SSTI Cookie hijacking SQL injection XXEDynstr is a different box that works with dynamic dns and a really uncommon privilege escalation. It is not an OSCP style box, but it is also interesting because of how different it is. We can learn many things about DNS with this system.
DNS base64 nsupdateMonitors is a hard machine that goes from apache, cacti, to wordpress servers. Privilege escalation involves lateral movement between users and escaping from a docker image, which makes this machine a long and difficult challenge, but very entertaining for somewhat experienced attackers.
Wordpress Cacti SQL injection LFI Docker TomcatCap is one of the easiest Linux machines available in the platform. It is the machine that I always recommend to my degree partners that want to start in HackTheBox, as it is very intuitive and the required tools are known for every person with IT knowledges, even if it is their first machine.
Wireshark Linpeas SSH GTFOBinsPit is a medium HackTheBox machine that targets SNMP exploitation and enumeration. It is enumerated with the public community, and an attack to SeedDMS gives us RCE to gain access to a CentOS control pannel. Some misconfigurations in a bash script which works with SNMP are used to escalate privileges and root this quite complex system.
SNMP UDP CentOS Nginx SELinuxThe Schooled HackTheBox machine is a Medium FreeBSD system with a Moodle web content manager, very real-life applicable as many school and university systems are configured the same way as this one. From a simple school webpage, you go through student, teacher and manager accounts to finally root the system.
FreeBSD moodle PHP hashcat packages mysqlThe Knife machine of HackTheBox is an easy Linux machine very useful to understand basic concepts about enumeration, and how to stablish a simple reverse shell. It is also helpful to understand the escalation of privileges using GTFObins.
Linux PHP GTFOBins knifeLove is a very easy Windows machine that can be easily solved if some basic concepts are clear. It contains a SSRF attack, which is not very common, and this machine is a very good example of how it works. Enumeration is also very important here, for both foothold and privilege escalation, this last one taking advantage of the AlwaysInstallElevated feature being turned on.
Windows SSRF WinPEAS AlwaysInstallElevatedAcademy is a very complete Linux machine about the new HackTheBox Academy platform, which covers enumeration with directory lists, virtual hosting, Laravel exploitation, a lot of lateral movement and privilege escalation with composer.
Linux laravel fuzzing composer burpsuiteTabby is an easy and enjoyable Linux machine with an LFI to get the foothold, user pivoting from tomcat and an abuse of the lxd group privilege.
Linux Tomcat lfi lxd fcrackzipRemote is a Windows machine with the Umbraco web content manager, which is exploited through a mountable partition and cached credentials whose greatest vulnerability is an outdated version of Umbraco, what makes possible to exploit the machine.
Windows umbraco msfvenom teamviewer evil-winrmSauna is a very complete Windows machine, in which some of the most common tools are used to gain access and escalate privileges in the system. The enumeration requires making a list of possible usernames using the about page of the website. In the privilege escalation, the Pass-The-Hash technique is used to become administrator, which makes the machine interesting at the same time that it is easy and enjoyable to start with Windows pentesting.
Windows Pass-The-Hash wordlists kerbrute impacket smbThe Drive machine is a hard Linux system that needs reverse engineering, and performing a SQL injection on a binary.
reverse-engineering ghidra sql-injectionThis system is exploited, after some fuzzing, through a Tomcat manager with path traversal that makes the typical WAR shell a bit more difficult, and lateral movement is performed, as well as privilege escalation, through ansible misconfigurations.
fuzzing Tomcat ansibleSpider is a complex machine with two SSTI vulnerabilities, and a really interesting method to get cookies with its private key. To escalate privileges we take advantage of the fact that we are allowed to enter input in an XML file, of which a parameter is displayed in a web service.
SSTI Cookie hijacking SQL injection XXEDynstr is a different box that works with dynamic dns and a really uncommon privilege escalation. It is not an OSCP style box, but it is also interesting because of how different it is. We can learn many things about DNS with this system.
DNS base64 nsupdateMonitors is a hard machine that goes from apache, cacti, to wordpress servers. Privilege escalation involves lateral movement between users and escaping from a docker image, which makes this machine a long and difficult challenge, but very entertaining for somewhat experienced attackers.
Wordpress Cacti SQL injection LFI Docker TomcatCap is one of the easiest Linux machines available in the platform. It is the machine that I always recommend to my degree partners that want to start in HackTheBox, as it is very intuitive and the required tools are known for every person with IT knowledges, even if it is their first machine.
Wireshark Linpeas SSH GTFOBinsPit is a medium HackTheBox machine that targets SNMP exploitation and enumeration. It is enumerated with the public community, and an attack to SeedDMS gives us RCE to gain access to a CentOS control pannel. Some misconfigurations in a bash script which works with SNMP are used to escalate privileges and root this quite complex system.
SNMP UDP CentOS Nginx SELinuxThe Schooled HackTheBox machine is a Medium FreeBSD system with a Moodle web content manager, very real-life applicable as many school and university systems are configured the same way as this one. From a simple school webpage, you go through student, teacher and manager accounts to finally root the system.
FreeBSD moodle PHP hashcat packages mysqlThe Knife machine of HackTheBox is an easy Linux machine very useful to understand basic concepts about enumeration, and how to stablish a simple reverse shell. It is also helpful to understand the escalation of privileges using GTFObins.
Linux PHP GTFOBins knifeLove is a very easy Windows machine that can be easily solved if some basic concepts are clear. It contains a SSRF attack, which is not very common, and this machine is a very good example of how it works. Enumeration is also very important here, for both foothold and privilege escalation, this last one taking advantage of the AlwaysInstallElevated feature being turned on.
Windows SSRF WinPEAS AlwaysInstallElevatedAcademy is a very complete Linux machine about the new HackTheBox Academy platform, which covers enumeration with directory lists, virtual hosting, Laravel exploitation, a lot of lateral movement and privilege escalation with composer.
Linux laravel fuzzing composer burpsuiteTabby is an easy and enjoyable Linux machine with an LFI to get the foothold, user pivoting from tomcat and an abuse of the lxd group privilege.
Linux Tomcat lfi lxd fcrackzipRemote is a Windows machine with the Umbraco web content manager, which is exploited through a mountable partition and cached credentials whose greatest vulnerability is an outdated version of Umbraco, what makes possible to exploit the machine.
Windows umbraco msfvenom teamviewer evil-winrmSauna is a very complete Windows machine, in which some of the most common tools are used to gain access and escalate privileges in the system. The enumeration requires making a list of possible usernames using the about page of the website. In the privilege escalation, the Pass-The-Hash technique is used to become administrator, which makes the machine interesting at the same time that it is easy and enjoyable to start with Windows pentesting.
Windows Pass-The-Hash wordlists kerbrute impacket smbCap is one of the easiest Linux machines available in the platform. It is the machine that I always recommend to my degree partners that want to start in HackTheBox, as it is very intuitive and the required tools are known for every person with IT knowledges, even if it is their first machine.
Wireshark Linpeas SSH GTFOBinsThe Knife machine of HackTheBox is an easy Linux machine very useful to understand basic concepts about enumeration, and how to stablish a simple reverse shell. It is also helpful to understand the escalation of privileges using GTFObins.
Linux PHP GTFOBins knifeLove is a very easy Windows machine that can be easily solved if some basic concepts are clear. It contains a SSRF attack, which is not very common, and this machine is a very good example of how it works. Enumeration is also very important here, for both foothold and privilege escalation, this last one taking advantage of the AlwaysInstallElevated feature being turned on.
Windows SSRF WinPEAS AlwaysInstallElevatedAcademy is a very complete Linux machine about the new HackTheBox Academy platform, which covers enumeration with directory lists, virtual hosting, Laravel exploitation, a lot of lateral movement and privilege escalation with composer.
Linux laravel fuzzing composer burpsuiteTabby is an easy and enjoyable Linux machine with an LFI to get the foothold, user pivoting from tomcat and an abuse of the lxd group privilege.
Linux Tomcat lfi lxd fcrackzipRemote is a Windows machine with the Umbraco web content manager, which is exploited through a mountable partition and cached credentials whose greatest vulnerability is an outdated version of Umbraco, what makes possible to exploit the machine.
Windows umbraco msfvenom teamviewer evil-winrmSauna is a very complete Windows machine, in which some of the most common tools are used to gain access and escalate privileges in the system. The enumeration requires making a list of possible usernames using the about page of the website. In the privilege escalation, the Pass-The-Hash technique is used to become administrator, which makes the machine interesting at the same time that it is easy and enjoyable to start with Windows pentesting.
Windows Pass-The-Hash wordlists kerbrute impacket smbThe blurry machine shows a vulnerability in ClearML, a development suite for ML/DL. It is classified with a medium difficulty.
deserialization privilege-escalation clearml reverse-shellThis system is exploited, after some fuzzing, through a Tomcat manager with path traversal that makes the typical WAR shell a bit more difficult, and lateral movement is performed, as well as privilege escalation, through ansible misconfigurations.
fuzzing Tomcat ansibleDynstr is a different box that works with dynamic dns and a really uncommon privilege escalation. It is not an OSCP style box, but it is also interesting because of how different it is. We can learn many things about DNS with this system.
DNS base64 nsupdatePit is a medium HackTheBox machine that targets SNMP exploitation and enumeration. It is enumerated with the public community, and an attack to SeedDMS gives us RCE to gain access to a CentOS control pannel. Some misconfigurations in a bash script which works with SNMP are used to escalate privileges and root this quite complex system.
SNMP UDP CentOS Nginx SELinuxThe Schooled HackTheBox machine is a Medium FreeBSD system with a Moodle web content manager, very real-life applicable as many school and university systems are configured the same way as this one. From a simple school webpage, you go through student, teacher and manager accounts to finally root the system.
FreeBSD moodle PHP hashcat packages mysqlThe Drive machine is a hard Linux system that needs reverse engineering, and performing a SQL injection on a binary.
reverse-engineering ghidra sql-injectionSpider is a complex machine with two SSTI vulnerabilities, and a really interesting method to get cookies with its private key. To escalate privileges we take advantage of the fact that we are allowed to enter input in an XML file, of which a parameter is displayed in a web service.
SSTI Cookie hijacking SQL injection XXEMonitors is a hard machine that goes from apache, cacti, to wordpress servers. Privilege escalation involves lateral movement between users and escaping from a docker image, which makes this machine a long and difficult challenge, but very entertaining for somewhat experienced attackers.
Wordpress Cacti SQL injection LFI Docker TomcatConfiguración y personalización de un entorno Linux orientado a pruebas de penetración y seguridad ofensiva
configuration tools setup bspwm scripting programmingautoUniCalendar is a script which converts the Uniovi calendar into Google and Microsoft calendars by reading the HTTP requests to the web server, and parsing the calendar data into a CSV file readable by every calendar application.
uniovi productivity github scripting programmingautoUniCalendar is a script which converts the Uniovi calendar into Google and Microsoft calendars by reading the HTTP requests to the web server, and parsing the calendar data into a CSV file readable by every calendar application.
uniovi productivity github scripting programmingConfiguración y personalización de un entorno Linux orientado a pruebas de penetración y seguridad ofensiva
configuration tools setup bspwm scripting programmingAnálisis forense de un volcado de memoria volátil (RAM) utilizando Volatility
forensic volatility sockets file recover ram analysisOptimizing ETL processes using a serverless architecture with Apache Airflow on AWS MWAA, achieving significant cost savings and efficiency.
AWS MWAA Apache Airflow serverless ETL data processing automationOptimizing ETL processes using a serverless architecture with Apache Airflow on AWS MWAA, achieving significant cost savings and efficiency.
AWS MWAA Apache Airflow serverless ETL data processing automationThe blurry machine shows a vulnerability in ClearML, a development suite for ML/DL. It is classified with a medium difficulty.
deserialization privilege-escalation clearml reverse-shellThe blurry machine shows a vulnerability in ClearML, a development suite for ML/DL. It is classified with a medium difficulty.
deserialization privilege-escalation clearml reverse-shell