a.k.a: did I spend a week ricing Arch? perhaps.
[HTB] Bashed
they actually left the webshell on the server 🤦♂️
[HTB] Headless
| URL | Link 🔗 |
|---|---|
| Level | Easy |
| Attacker IP | 10.10.14.31 |
| Target IP | 10.10.11.8 |
Intro
Today I am tackling the HackTheBox machine Headless. I will start with discovering a web server running on TCP/5000. Then I will uncover a Stored XSS. By exploiting this, I will exfiltrate the is_admin cookie, gaining access to the restricted endpoint, abuse a command injection within it to achieve RCE and establish a reverse shell. Ultimately, I will escalate privileges by exploiting a misconfigured script to obtain root access and pwn the target.
[HTB] Nibbles
started to solve HackTheBoxes
[HMV] Twisted
a little bit of steganography