HTB Hospital CTF Writeup

HTB Hospital CTF Writeup This penetration testing report provides a detailed analysis of the security posture of HTB Hospital CTF IT infrastructure, highlighting various vulnerabilities identified during the assessment process. The findings within this document reveal critical security flaws ranging from file upload restrictions bypasses to privilege escalation and web server takeover, which could potentially […]

HTB Hospital CTF Writeup Read More »

HTB IClean CTF Writeup

HTB IClean CTF Writeup Our comprehensive penetration test on HTB IClean CTF environment uncovered a series of vulnerabilities, from web-based exploits to deep system-level compromises. This report delves into the intricate vulnerabilities identified, offering a clear-eyed view of the cybersecurity challenges faced and the urgent remedial actions recommended to safeguard against potential cyber adversaries. Fig.

HTB IClean CTF Writeup Read More »

HTB Headless CTF Writeup

HTB Headless CTF Writeup This comprehensive document unveils a range of vulnerabilities from medium to extreme severity within the HTB Headless CTF environment. Fig. 01: HTB Headless CTF banner image Executive Summary Overview The pentest conducted on the Headless CTF platform has uncovered multiple critical security vulnerabilities. These vulnerabilities span from blind Cross-Site Scripting (XSS)

HTB Headless CTF Writeup Read More »

HTB FormulaX CTF Writeup

HTB FormulaX CTF Writeup This comprehensive document unveils a range of vulnerabilities from medium to extreme severity within the HTB FormulaX CTF environment, including web applications, backend services, and system configurations. Through this exploration, we not only highlight the critical security lapses but also offer targeted recommendations to bolster defenses.  Executive Summary Overview This report

HTB FormulaX CTF Writeup Read More »

Registry CTF Writeup

Registry CTF Writeup The challenge calls for the exploitation of various security weaknesses, including the use of default credentials, exposure of sensitive information through docker images, and cracking of database passwords to gain unauthorized access. Additionally, it tests our ability to perform both horizontal and vertical privilege escalations by exploiting system misconfigurations and known software

Registry CTF Writeup Read More »

Jarvis CTF Writeup

Jarvis CTF Writeup Jarvis CTF Jarvis is a medium-level Linux challenge featuring a web server with SQL injection vulnerability. Exploiting this leads to initial access. Privilege escalation involves executing a script as another user and exploiting an SUID bit set on systemctl to gain root access. HackTheBox Hack The Box gives individuals, businesses and universities

Jarvis CTF Writeup Read More »

SolidState CTF Writeup

SolidState CTF Writeup Writeup presented by Behind Security as part of the Road to OSCP series, focusing on the SolidState CTF from HackTheBox. SolidState CTF SolidState is a medium difficulty machine that requires chaining of multiple attack vectors in order to get a privileged shell. HackTheBox Hack The Box gives individuals, businesses and universities the

SolidState CTF Writeup Read More »

Poison CTF Writeup

Poison CTF Writeup Writeup presented by Behind Security as part of the Road to OSCP series, focusing on the Poison CTF from HackTheBox. Poison CTF Poison CTF is a machine which focuses mainly on log poisoning and port forwarding/tunneling. The machine is running FreeBSD which presents a few challenges for novice users as many common

Poison CTF Writeup Read More »

Scroll to Top