GitHub - jon-brandy/hackthebox: My WriteUps for HackTheBox CTFs, Machines, and Sherlocks.
1
Blue
Metasploit, smbclient, EternalBlue, Meterpreter
2
Jerry
Tomcat exploitation, Msfvenom reverse shell, Metasploit usage
3
Lame
FTP, CVE exploitation, Backdoor, SMB, Remote Code Execution (RCE)
4
Netmon
FTP enumeration, Searchsploit usage
5
Photobomb
Command injection, Pwncat usage, PATH hijacking
6
Precious
Setting up simple Python server, PDFKit CVE exploitation, Pwncat, Ruby exploit, YAML exploit
7
Shoppy
Gobuster usage, NoSQL injection, MongoDB exploitation, Password hash cracking, Ffuf usage, Docker privesc via GTFOBins
8
Cap
Exploiting Python 3.8 cap_setuid, Wireshark usage, IDOR vulnerability
9
Busqueda
Server-side template injection (SSTI), Remote code execution (RCE), Gitea exploitation
10
Knife
PHP CVE exploitation, Knife binary GTFOBins
11
Bashed
Gobuster usage, Webshell deployment, Cronjob exploitation
12
Shocker
Gobuster usage, Shellshock attack, Perl binary exploitation
13
Beep
Dirbuster usage, Elastix webserver exploitation, FreePBX service exploitation
14
Blocky
Dirbuster usage, JADX-GUI for reverse engineering
15
Bank
Gobuster usage, Identifying failed hash or encryption methods, Msfvenom reverse shell
16
Nibbles
Gobuster usage, Nibble blog exploit, Techmint Linux monitoring script exploit
17
SteamCloud
Kubernetes exploitation, Pod forging
18
Keeper
WinDbg usage, KeePass key dumper (Keydumper), PuTTY key generation and usage (PuttyGen)
19
Optimum
Rejetto HTTP File Server exploit, Metasploit usage
20
Legacy
SMB CVE exploitation, Metasploit usage
21
Granny
Microsoft IIS 6.0 exploit, Metasploit usage
22
Grandpa
Microsoft IIS 6.0 exploit, Metasploit usage
23
Devel
ASPX reverse shell, Microsoft IIS 7.5 exploit, Metasploit usage
24
Horizontall
Generating SSH keygen, Port forwarding, Laravel 8.4.2 exploit
25
Validation
SQL injection (SQLi), PHP reverse shell
26
Nunchucks
Gobuster usage, Nunjucks template engine exploit, Perl binary exploitation, AppArmor Perl bugs
27
Late
Flask SSTI, SSH keygen, LinPEAS usage, Pspy64
28
BountyHunter
Dirbuster usage, XXE exploitation, Abusing Python script misconfiguration
29
Mirai
Raspberry Pi server setup, Linux file recovery with dcfldd, Volume mounting
30
Armageddon
Drupal 7 service exploit, Dirty Sock exploit
31
Paper
WordPress exploitation, Password reuse, LinPEAS usage, Sudo exploit
32
MonitorsTwo
Cacti login page exploit, Hash cracking with John the Ripper, Listing SUID binaries, capsh GTFOBins
33
Inject
Directory traversal, Searchsploit usage, Spring Framework exploit, Pspy64, YAML forging
34
Sau
Request Baskets v1.2.1 exploit, SSRF, Maltrail v0.53 exploit
35
Pilgrimage
ImageMagick LFI, Git dumper usage, Binwalk CVE RCE
36
CozyHosting
Dirsearch usage, Base64 encoded bash reverse shell, JD-GUI, PostgreSQL, Hash cracking with John and Hashcat, sudo GTFOBins
37
Topology
LaTeX injection, Ffuf usage, Hash cracking with John, Pspy64, Forging PLT files to exploit Gnuplot binary cronjobs
38
Explore
ADB, Metasploit usage, ES File Explorer exploit, oHostKeyAlgorithms, Port forwarding
39
Previse
Dirbuster usage, Command injection, Hash cracking with John, Forging bash gzip, PATH hijacking
40
Broker
Apache ActiveMQ exploitation, Remote code execution (RCE)
41
Delivery
Email impersonation, Hash cracking using Best64 and John the Ripper
42
Codify
Virtual Machine 2 (VM2) exploitation, Hash identification, Hash cracking with John, Python bruteforce script creation
43
Analytics
Metabase login page exploit, Metasploit usage, LinPEAS usage, Local privilege escalation on Ubuntu 22.10 / 22.04
44
Soccer
Dirsearch usage, H3K Tiny File Manager exploitation, WebSocket exploitation, SQLmap for blind SQLi, Privilege escalation using SUID doas, Forging dstat using Python
45
Timelapse
Enumerating public SMB shares with smbclient, Cracking Personal Information Exchange (PFX) files, OpenSSL, pfx2john, evil-winrm, Active Directory enumeration
46
Devvortex
Ffuf usage, Dirsearch usage, Joomla v4.2 CMS exploitation, Password hash cracking with John, apport-cli binary exploitation
47
Return
SMB service enumeration with smbclient and enum4linux, Abusing printer's network, evil-winrm, Group membership enumeration for svc-printer account, Msfvenom, Active Directory security group abuse, Metasploit usage
48
Irked
Unreal Engine 3.2.8.1 exploitation, Metasploit usage, LinPEAS usage
49
Perfection
WEBrick 1.7.0 exploitation, ERB and Ruby RCE, LinPEAS usage, Time-based password hash cracking with John
50
Headless
XSS, Cookie stealing, Command injection, Remote code execution (RCE), Abusing syscheck misconfiguration for root
51
Wifinetic
FTP anonymous login, WiFi network interface enumeration, WiFi network configuration dumping, WPS PIN brute forcing using Reaver
52
OpenAdmin
Dirsearch usage, OpenNetAdmin v18.1.1 exploit, Bash reverse shell, Abusing Apache2 internal misconfiguration, Password cracking with John, Port forwarding, Webshell deployment, SSH private key cracking, Privilege escalation in nano by resetting stdin/stdout/stderr
53
TraceBack
Gobuster usage, SSH key generation, Forging Lua scripts, SSH MOTD manipulation