Skip to main content

15 docs tagged with "HackTheBox"

View all tags

BountyHunter

Easy Linux box exploiting an XXE to read files and Python eval in a root ticket validator.

Broadlight

Easy Linux web machine with a vulnerable Dolibarr CMS (CVE‑2023‑30253) and SUID root escalation via Enlightenment WM.

Buff

Easy Windows box exploiting Gym Management Software RCE then a CloudMe buffer overflow for PrivEsc.

Headless

Easy Linux box leveraging blind XSS in a contact form and a command injection for shell and PrivEsc.

Jerry

Easy Windows box using default Tomcat Manager credentials to deploy a WAR reverse shell and gain SYSTEM.

Keeper

Easy Linux box abusing default creds on Request Tracker, KeePass dump (CVE‑2023‑32784) to retrieve root SSH key.

Legacy

Easy Windows XP machine vulnerable to MS08‑067 EternalBlue SMB exploit for root.

Monitored

Medium Linux box abusing SNMP creds, Nagios XI SQLi + API abuse to gain command execution and root PrivEsc.

Netmon

Easy Windows box with anonymous FTP to steal PRTG config, then RCE via PRTG Network Monitor.

Optimum

Easy Windows machine exploiting HttpFileServer 2.3 RCE for initial shell and unpatched kernel vulnerability for PrivEsc.

Perfection

Easy Linux box exploiting SSTI in a grade calculator, cracking hashes, and sudo-based PrivEsc.

Runner

Medium Linux machine exploiting CVE‑2023‑42793 in TeamCity for initial access, followed by CVE‑2024‑21626 via Portainer for container escape and PrivEsc.

Sauna

Easy Active Directory Windows box using AS-REP Roasting and Kerberoasting to escalate to SYSTEM.

Toolbox

Easy Windows box with SQL injection in a Docker Toolbox‑hosted app, leading to container escape and host PrivEsc.

Usage

Easy Linux box using blind SQLi to dump DB, Laravel file‑upload webshell, and local binary PrivEsc.