Hack The Box Write‑ups🔗
Welcome to my comprehensive collection of Hack The Box (HTB) machine write-ups. Each writeup documents a complete attack chain from initial enumeration to privilege escalation, with detailed explanations of why every step works.
What Makes These Different
These writeups focus on manual exploitation techniques and understanding the underlying vulnerabilities rather than just running automated tools. Each step includes the reasoning behind the approach and alternative methods when applicable.
How to Navigate🔗
- Browse machines by difficulty in the sidebar
- Use the search function (top-right) for specific tools, CVEs, or techniques
- Check the Resources section for methodology and tool references
Each writeup follows this consistent format:
- Synopsis — Key facts, difficulty, and learning objectives
- Enumeration — Port scanning, service discovery, and reconnaissance
- Foothold — Initial access method and vulnerability exploitation
- Privilege Escalation — Path to administrative access
- Lessons Learned — Key takeaways, references, and remediation
- Filter by difficulty using the navigation tabs
- Copy commands directly from code blocks (hover for copy button)
- Follow attack paths with visual flow diagrams where applicable
Current Write‑ups🔗
Difficulty | Machine | Attack Path | Key Techniques |
---|---|---|---|
Easy | Sau | SSRF → Maltrail RCE → sudo privesc | CVE-2023-27163, Command injection, systemctl pager escape |
Methodology Overview🔗
Comprehensive nmap scanning, service enumeration, and technology fingerprinting
Manual testing, CVE research, and exploit development/modification
Gaining initial foothold through identified vulnerabilities
System enumeration, credential harvesting, and privilege escalation
Comprehensive writeup with screenshots, code, and security recommendations
About🔗
These writeups are created for educational purposes to help security professionals understand attack methodologies and improve defensive strategies. All activities are performed in controlled lab environments.
Ethical Use
The techniques documented here should only be used in authorized testing environments or your own lab setups. Always obtain proper permission before testing any systems.