HTB - Hospital
Summary The “Hospital” on Hack The Box was an engaging challenge at the medium difficulty level. The Windows-based machine featured multiple avenues for exploitation. Initially, we navigated thro...
Summary The “Hospital” on Hack The Box was an engaging challenge at the medium difficulty level. The Windows-based machine featured multiple avenues for exploitation. Initially, we navigated thro...
Summary The Gatekeeper box on TryHackMe was an interesting intermediate-level Windows machine. The initial key was exploiting a buffer overflow vulnerability to gain that initial foothold on the ...
Summary The machine Shibboleth was a challenging and fun box. It starts with a static website and UDP port running “asf-rmcp” service which on exploitation leaks a hash from IPMI and cracked it t...
Summary The RouterSpace machine from hack the box was very easy and fun box. It involved installing of an apk file which could be downloaded from there webpage. The application’s feature containe...
Summary The machine Querier was a fun and medium level windows box, which involved macro file enumeration, mssql service exploitation, and some basic windows privilege escalation steps. We could ...
Summary The Catch Machine in the hack the box was medium leveled fun box. This machine had hosted three different websites on different ports, From the first webpage we will download and apk file...
Summary The Dynstr machine from hack the box was medium and fun box which contained a very good concept of dynamic DNS provider. We will start with command injection vulnerability in the DNS/IP u...
Summary This was a medium and unique box. It has the concept of SELinux, UDP port running SNMP service which is used in different ways and most of the HTB machine does not include these things. W...
Summary The Forest machine of hack the box was an easy leveled box which provided very good concept about user enumeration and Kerberoasting the users to get the Winrm shell of a user. That user ...
Summary This Machine Return specially focuses on exploiting a printer’s configuration which was exposed on the website the server was hosting by which we could exploit it and get the credentials ...