Linux Environment

HTB Hospital CTF Writeup

HTB Hospital CTF Writeup This penetration testing report provides a detailed analysis of the security posture of HTB Hospital CTF IT infrastructure, highlighting various vulnerabilities identified during the assessment process. The findings within this document reveal critical security flaws ranging from file upload restrictions bypasses to privilege escalation and web server takeover, which could potentially […]

HTB Hospital CTF Writeup Read More »

HTB IClean CTF Writeup

HTB IClean CTF Writeup Our comprehensive penetration test on HTB IClean CTF environment uncovered a series of vulnerabilities, from web-based exploits to deep system-level compromises. This report delves into the intricate vulnerabilities identified, offering a clear-eyed view of the cybersecurity challenges faced and the urgent remedial actions recommended to safeguard against potential cyber adversaries. Fig.

HTB IClean CTF Writeup Read More »

HTB Headless CTF Writeup

HTB Headless CTF Writeup This comprehensive document unveils a range of vulnerabilities from medium to extreme severity within the HTB Headless CTF environment. Fig. 01: HTB Headless CTF banner image Executive Summary Overview The pentest conducted on the Headless CTF platform has uncovered multiple critical security vulnerabilities. These vulnerabilities span from blind Cross-Site Scripting (XSS)

HTB Headless CTF Writeup Read More »

HTB FormulaX CTF Writeup

HTB FormulaX CTF Writeup This comprehensive document unveils a range of vulnerabilities from medium to extreme severity within the HTB FormulaX CTF environment, including web applications, backend services, and system configurations. Through this exploration, we not only highlight the critical security lapses but also offer targeted recommendations to bolster defenses.  Executive Summary Overview This report

HTB FormulaX CTF Writeup Read More »

HTB Skyfall CTF Writeup

HTB Skyfall CTF Writeup This document aims to provide a concise overview of the identified vulnerabilities within HTB Skyfall CTF and offers targeted recommendations for strengthening the security posture against sophisticated threats inherent in such an advanced and challenging environment. Executive Summary Overview The pentest conducted on Skyfall CTF's infrastructure revealed several critical vulnerabilities that

HTB Skyfall CTF Writeup Read More »

Jarvis CTF Writeup

Jarvis CTF Writeup Jarvis CTF Jarvis is a medium-level Linux challenge featuring a web server with SQL injection vulnerability. Exploiting this leads to initial access. Privilege escalation involves executing a script as another user and exploiting an SUID bit set on systemctl to gain root access. HackTheBox Hack The Box gives individuals, businesses and universities

Jarvis CTF Writeup Read More »

SolidState CTF Writeup

SolidState CTF Writeup Writeup presented by Behind Security as part of the Road to OSCP series, focusing on the SolidState CTF from HackTheBox. SolidState CTF SolidState is a medium difficulty machine that requires chaining of multiple attack vectors in order to get a privileged shell. HackTheBox Hack The Box gives individuals, businesses and universities the

SolidState CTF Writeup Read More »

Poison CTF Writeup

Poison CTF Writeup Writeup presented by Behind Security as part of the Road to OSCP series, focusing on the Poison CTF from HackTheBox. Poison CTF Poison CTF is a machine which focuses mainly on log poisoning and port forwarding/tunneling. The machine is running FreeBSD which presents a few challenges for novice users as many common

Poison CTF Writeup Read More »

Scroll to Top