Hacking the matrix, one phish at a time

Hack The Box

MOST RECENT

On this machine we manipulate JWT tokens abusing of the public key leaked and we escalate privileges abusing of trust on CA signed certificates.
cap htb writeup
We explore IDOR vulnerabilities in web-based capture services for initial access, analyze unencrypted protocol traffic for credential harvesting, and leverage misconfigured Linux capabilities for privilege escalation.
code-part-two-htb writeup
We explore open web services for initial access, manipulate vulnerable Python libraries (js2py) to achieve a sandbox escape for lateral movement, and exploit flawed input validation in sudo-enabled backup utilities for privilege escalation.