Home | 0xv01d
CTF Solutions
HacktheBox Machines
SVG Image
/images/index/link.svg

Headless

/easy.svg

Easy

/linux.svg

Linux

Skills used

/arrowDown.svg

Skills

  • Web Enumeration
  • Service Enumeration
  • Directory Enumeration
  • XSS (Cross-Site Scripting) Cookie Stealing
  • Command Injection
  • Reverse Shell Setup
  • Bash Script Injection (Privilege Escalation)
/images/index/link.svg

Squashed

/easy.svg

Easy

/linux.svg

Linux

Skills used 17

/arrowDown.svg

Skills

  • Web Enumeration
  • NFS Enumeration
  • Abusing owners assigned to NFS shares by creating new users on the system (Get Access to Web Root)
  • Creating a web shell to gain system access
  • Abusing .Xauthority file (Pentesting X11)
  • Taking a screenshot of another user's session
/images/index/link.svg

Support

/easy.svg

Easy

/windows.svg

Windows

Skills used

/arrowDown.svg

Skills

  • Users Enumeration [Kerbrute]
  • SMB Enumeration
  • EXE Binary Analysis
  • Network Traffic Analysis [Wireshark]
  • DNSpy Static Analysis
  • Password Decoding [Cyberchef]
  • RPC Users Enumeration
  • Ldap Enumeration (ldapsearch)
  • Information Leakage
  • Abusing Remote Management Users group (Evil-WinRM)
  • SharpHound + BloodHound Enumeration
  • Abusing Shared Support Accounts (GenericAll) (rbcd Attack) [Resource Based Constrained Delegation]
  • Resource Based Constrained Delegation Attack - Creating a Computer Object (powermad.ps1)
  • Resource Based Constrained Delegation Attack - Getting the impersonated service ticket (getST.py)
  • Using the ticket to gain Administrator access [Privilege Escalation]
/images/index/link.svg

Trick

/easy.svg

Easy

/linux.svg

Linux

Skills used 17

/arrowDown.svg

Skills

  • DNS Enumeration
  • Domain Zone Transfer Attack (AXFR)
  • SQL Injection (SQLI)
  • Local File Inclusion (LFI)
  • Subdomain Discovery
  • Abusing Sudoers Privilege (fail2ban command)
/images/index/link.svg

Health

/easy.svg

Medium

/linux.svg

Linux

Skills used 17

/arrowDown.svg

Skills

  • Web Enumeration
  • Abusing WebHook Setup
  • Exploiting SSRF (Server Side Request Forgery) - Open redirect
  • Gogs v0.5.5 Exploitation - SQL Injection [CVE-2014-8682]
  • Creating a SQL injection that allows us to obtain the salt and password of a user
  • Hash restructuring in order to crack it
  • Password Cracking [Hashcat]
  • SSRF (Server Side Request Forgery) + SQL Injection
  • Abusing Cron Job (Database Manipulation) [Privilege Escalation]
/images/index/link.svg

Outdated

/medium.svg

Medium

/windows.svg

Windows

Skills used 17

/arrowDown.svg

Skills

  • SMB Enumeration
  • Follina Exploitation (CVE-2022-30190) + ConPtyShell TCP Shell [Remote Code Execution]
  • SharpHound + BloodHound DC Enumeration
  • Abusing AddKeyCredentialLink Privilege [Invoke-Whisker.ps1 - Shadow Credentials]
  • Getting the user's NTLM Hash with Rubeus
  • Abusing WinRM - EvilWinRM
  • Abusing WSUS Administrators Group
  • WSUS Exploitation - Creating a malicious patch for deployment [Privilege Escalation]
/images/index/link.svg

Faculty

/medium.svg

Medium

/linux.svg

Linux

Skills used 17

/arrowDown.svg

Skills

  • Web Enumeration
  • SQL Injection (SQLI)
  • Information Leakage - Error Messages
  • Login bypass - SQLI
  • Abusing MPDF - Local File Inclusion (LFI)
  • Abusing meta-git command - RCE via insecure command formatting
  • Abusing gdb capabilitie (cap_sys_ptrace+ep) [Privilege Escalation]
/images/index/link.svg

Moderators

/hard.svg

Hard

/linux.svg

Linux

Skills used 17

/arrowDown.svg

Skills

  • Web Enumeration
  • Information Leakage
  • Insecure Direct Object Reference (IDOR) in order to discover valid reports
  • Abusing File Upload - Uploading a PHP file disguised as PDF + Obfuscated Web Shell (Weevely3)
  • Abusing Internal Web Server - Port Forwarding [Chisel]
  • Wordpress Brandfolder 3.0 Plugin Exploitation - Local/Remote File Inclusion (User Pivoting)
  • Changing admin user password in wordpress via MYSQL (Wordpress Password Hash Generator)
  • Virtual Box Image Enumeration
  • Cracking VirtualBox Encryption (pyvboxdie-cracker)
  • Creating a new virtual machine in VirtualBox and installing the extension pack
  • Decrypting the VirtualBox VDI Image with VBoxManage
  • Mounting the VirtualBox VDI Image (qemu-nbd)
  • Cracking the LUKS v2 Password (bruteforce-luks-static-linux-amd64)
  • Mounting the Luks Drive (cryptsetup)
  • Finding a password among the mounted files
  • Abusing sudoers privilege [Privilege Escalation]
/images/index/link.svg

Hathor

/insane.svg

Insane

/windows.svg

Windows

Skills used 17

/arrowDown.svg

Skills

  • Web Enumeration
  • Information Leakage (Default Credentials)
  • Web Shell Exploiting File Upload Vulnerability
  • Abusing Get-bADpasswords Misconfiguration To Get a Weak Hash
  • Password Cracking [Hashcat]
  • SMB Internal Enumeration
  • User Pivoting (User Impersonation Via Web Shell)
  • Process Enumeration
  • DLL Hijacking (Get-bADpasswords dll)
  • Finding PFX File (System Enumeration)
  • Cracking PFX File (crackpkcs12)
  • Script Hijacking (Malicious Powershell Script)
  • Dumping Hashes Abusing Get-ADReplAccount [Privilege Scalation]
  • Getting a Ticket as Administrator (Ticketer)
  • Administrator Connection Via SMB-Client
HacktheBox Challenges
SVG Image
/images/index/link.svg

Fishy HTTP

/easy.svg

Easy

/forensics.svg

Forensics

Skills used 10

/arrowDown.svg

Skills

  • The Skills Will Be Updated After The Challenge Release.
/images/index/link.svg

RedTrails

/medium.svg

Medium

/forensics.svg

Forensics

Skills used 10

/arrowDown.svg

Skills

  • The Skills Will Be Updated After The Challenge Release.
PortSwigger Academy
SVG Image
TryHackMe
SVG Image
Medium
SVG Image

0xv01d © 2022 - 2024