Writeups

HTB Forest CTF Writeup

HTB Forest CTF Writeup This assessment on HTB Forest CTF aimed to evaluate the security posture of the Active Directory (AD) environment and associated infrastructure. During the evaluation, several vulnerabilities were identified, ranging from information disclosure and initial access to domain takeover. These issues highlight weaknesses in access control, account configurations, and privilege management. Addressing […]

HTB Forest CTF Writeup Read More »

HTB Hospital CTF Writeup

HTB Hospital CTF Writeup This penetration testing report provides a detailed analysis of the security posture of HTB Hospital CTF IT infrastructure, highlighting various vulnerabilities identified during the assessment process. The findings within this document reveal critical security flaws ranging from file upload restrictions bypasses to privilege escalation and web server takeover, which could potentially

HTB Hospital CTF Writeup Read More »

HTB IClean CTF Writeup

HTB IClean CTF Writeup Our comprehensive penetration test on HTB IClean CTF environment uncovered a series of vulnerabilities, from web-based exploits to deep system-level compromises. This report delves into the intricate vulnerabilities identified, offering a clear-eyed view of the cybersecurity challenges faced and the urgent remedial actions recommended to safeguard against potential cyber adversaries. Fig.

HTB IClean CTF Writeup Read More »

HTB Headless CTF Writeup

HTB Headless CTF Writeup This comprehensive document unveils a range of vulnerabilities from medium to extreme severity within the HTB Headless CTF environment. Fig. 01: HTB Headless CTF banner image Executive Summary Overview The pentest conducted on the Headless CTF platform has uncovered multiple critical security vulnerabilities. These vulnerabilities span from blind Cross-Site Scripting (XSS)

HTB Headless CTF Writeup Read More »

HTB FormulaX CTF Writeup

HTB FormulaX CTF Writeup This comprehensive document unveils a range of vulnerabilities from medium to extreme severity within the HTB FormulaX CTF environment, including web applications, backend services, and system configurations. Through this exploration, we not only highlight the critical security lapses but also offer targeted recommendations to bolster defenses.  Executive Summary Overview This report

HTB FormulaX CTF Writeup Read More »

HTB Skyfall CTF Writeup

HTB Skyfall CTF Writeup This document aims to provide a concise overview of the identified vulnerabilities within HTB Skyfall CTF and offers targeted recommendations for strengthening the security posture against sophisticated threats inherent in such an advanced and challenging environment. Executive Summary Overview The pentest conducted on Skyfall CTF's infrastructure revealed several critical vulnerabilities that

HTB Skyfall CTF Writeup Read More »

Registry CTF Writeup

Registry CTF Writeup The challenge calls for the exploitation of various security weaknesses, including the use of default credentials, exposure of sensitive information through docker images, and cracking of database passwords to gain unauthorized access. Additionally, it tests our ability to perform both horizontal and vertical privilege escalations by exploiting system misconfigurations and known software

Registry CTF Writeup Read More »

Jarvis CTF Writeup

Jarvis CTF Writeup Jarvis CTF Jarvis is a medium-level Linux challenge featuring a web server with SQL injection vulnerability. Exploiting this leads to initial access. Privilege escalation involves executing a script as another user and exploiting an SUID bit set on systemctl to gain root access. HackTheBox Hack The Box gives individuals, businesses and universities

Jarvis CTF Writeup Read More »

Scroll to Top