GitHub - jon-brandy/hackthebox: My WriteUps for HackTheBox CTFs, Machines, and Sherlocks.

1 Blue Metasploit, smbclient, EternalBlue, Meterpreter 2 Jerry Tomcat exploitation, Msfvenom reverse shell, Metasploit usage 3 Lame FTP, CVE exploitation, Backdoor, SMB, Remote Code Execution (RCE) 4 Netmon FTP enumeration, Searchsploit usage 5 Photobomb Command injection, Pwncat usage, PATH hijacking 6 Precious Setting up simple Python server, PDFKit CVE exploitation, Pwncat, Ruby exploit, YAML exploit 7 Shoppy Gobuster usage, NoSQL injection, MongoDB exploitation, Password hash cracking, Ffuf usage, Docker privesc via GTFOBins 8 Cap Exploiting Python 3.8 cap_setuid, Wireshark usage, IDOR vulnerability 9 Busqueda Server-side template injection (SSTI), Remote code execution (RCE), Gitea exploitation 10 Knife PHP CVE exploitation, Knife binary GTFOBins 11 Bashed Gobuster usage, Webshell deployment, Cronjob exploitation 12 Shocker Gobuster usage, Shellshock attack, Perl binary exploitation 13 Beep Dirbuster usage, Elastix webserver exploitation, FreePBX service exploitation 14 Blocky Dirbuster usage, JADX-GUI for reverse engineering 15 Bank Gobuster usage, Identifying failed hash or encryption methods, Msfvenom reverse shell 16 Nibbles Gobuster usage, Nibble blog exploit, Techmint Linux monitoring script exploit 17 SteamCloud Kubernetes exploitation, Pod forging 18 Keeper WinDbg usage, KeePass key dumper (Keydumper), PuTTY key generation and usage (PuttyGen) 19 Optimum Rejetto HTTP File Server exploit, Metasploit usage 20 Legacy SMB CVE exploitation, Metasploit usage 21 Granny Microsoft IIS 6.0 exploit, Metasploit usage 22 Grandpa Microsoft IIS 6.0 exploit, Metasploit usage 23 Devel ASPX reverse shell, Microsoft IIS 7.5 exploit, Metasploit usage 24 Horizontall Generating SSH keygen, Port forwarding, Laravel 8.4.2 exploit 25 Validation SQL injection (SQLi), PHP reverse shell 26 Nunchucks Gobuster usage, Nunjucks template engine exploit, Perl binary exploitation, AppArmor Perl bugs 27 Late Flask SSTI, SSH keygen, LinPEAS usage, Pspy64 28 BountyHunter Dirbuster usage, XXE exploitation, Abusing Python script misconfiguration 29 Mirai Raspberry Pi server setup, Linux file recovery with dcfldd, Volume mounting 30 Armageddon Drupal 7 service exploit, Dirty Sock exploit 31 Paper WordPress exploitation, Password reuse, LinPEAS usage, Sudo exploit 32 MonitorsTwo Cacti login page exploit, Hash cracking with John the Ripper, Listing SUID binaries, capsh GTFOBins 33 Inject Directory traversal, Searchsploit usage, Spring Framework exploit, Pspy64, YAML forging 34 Sau Request Baskets v1.2.1 exploit, SSRF, Maltrail v0.53 exploit 35 Pilgrimage ImageMagick LFI, Git dumper usage, Binwalk CVE RCE 36 CozyHosting Dirsearch usage, Base64 encoded bash reverse shell, JD-GUI, PostgreSQL, Hash cracking with John and Hashcat, sudo GTFOBins 37 Topology LaTeX injection, Ffuf usage, Hash cracking with John, Pspy64, Forging PLT files to exploit Gnuplot binary cronjobs 38 Explore ADB, Metasploit usage, ES File Explorer exploit, oHostKeyAlgorithms, Port forwarding 39 Previse Dirbuster usage, Command injection, Hash cracking with John, Forging bash gzip, PATH hijacking 40 Broker Apache ActiveMQ exploitation, Remote code execution (RCE) 41 Delivery Email impersonation, Hash cracking using Best64 and John the Ripper 42 Codify Virtual Machine 2 (VM2) exploitation, Hash identification, Hash cracking with John, Python bruteforce script creation 43 Analytics Metabase login page exploit, Metasploit usage, LinPEAS usage, Local privilege escalation on Ubuntu 22.10 / 22.04 44 Soccer Dirsearch usage, H3K Tiny File Manager exploitation, WebSocket exploitation, SQLmap for blind SQLi, Privilege escalation using SUID doas, Forging dstat using Python 45 Timelapse Enumerating public SMB shares with smbclient, Cracking Personal Information Exchange (PFX) files, OpenSSL, pfx2john, evil-winrm, Active Directory enumeration 46 Devvortex Ffuf usage, Dirsearch usage, Joomla v4.2 CMS exploitation, Password hash cracking with John, apport-cli binary exploitation 47 Return SMB service enumeration with smbclient and enum4linux, Abusing printer's network, evil-winrm, Group membership enumeration for svc-printer account, Msfvenom, Active Directory security group abuse, Metasploit usage 48 Irked Unreal Engine 3.2.8.1 exploitation, Metasploit usage, LinPEAS usage 49 Perfection WEBrick 1.7.0 exploitation, ERB and Ruby RCE, LinPEAS usage, Time-based password hash cracking with John 50 Headless XSS, Cookie stealing, Command injection, Remote code execution (RCE), Abusing syscheck misconfiguration for root 51 Wifinetic FTP anonymous login, WiFi network interface enumeration, WiFi network configuration dumping, WPS PIN brute forcing using Reaver 52 OpenAdmin Dirsearch usage, OpenNetAdmin v18.1.1 exploit, Bash reverse shell, Abusing Apache2 internal misconfiguration, Password cracking with John, Port forwarding, Webshell deployment, SSH private key cracking, Privilege escalation in nano by resetting stdin/stdout/stderr 53 TraceBack Gobuster usage, SSH key generation, Forging Lua scripts, SSH MOTD manipulation