Hackthebox

Hello! I’m a SOC analyst and cybersecurity enthusiast. In my free time, I enjoy practicing on CTFs and writing up about them.


Sense : Pfsense webserver exploit

Bashed : scriptmanager exploit

Armageddon : Drupal exploit

Active : Kerboros exploit

Netmon : PRTG RCE exploit

Nibbles : Nibbleblog exploit

Forest : Active Directory exploit

Previse : Web intercept exploit

Artic : Coldbox fusion exploit

Shocker : Shellshock exploit

Blocky : Password reuse exploit

Knife : PHP RCE

Irked : IRC exploit

Buff : Exploit using port forwarding

Mirai : IoT exploit

Networked : File Image exploit

Valentine : Heartbleed exploit

Devel : Windows RCE exploit

Beep : LFI enumeration and webmin exploit

Timelapse : Exploiting using SMB and PowerShell

Tier 0 : Starting Point Machine

Tier 1 : Starting Point Machine

Optimum : Windows 2012 R2 Server exploit

Return : Windows Printer service exploit

Jerry : Apache tomcat code execution exploit

Blue : Eternal Blue SMB exploit

Lame : Samba Username map script

Cap : Wireshark recon

Granny : IIS 6.0 Vulnerability code execution

Legacy : MS08-067 exploit

Grandpa : IIS 6.0 Vulnerability code execution