Hacking the matrix, one phish at a time

Hack The Box

MOST RECENT

cap htb writeup
We explore IDOR vulnerabilities in web-based capture services for initial access, analyze unencrypted protocol traffic for credential harvesting, and leverage misconfigured Linux capabilities for privilege escalation.
code-part-two-htb writeup
We explore open web services for initial access, manipulate vulnerable Python libraries (js2py) to achieve a sandbox escape for lateral movement, and exploit flawed input validation in sudo-enabled backup utilities for privilege escalation.