Skip to content

HTB: HackTheBox Season 10

Arbaaz Jamadar
Written by
Arbaaz Jamadar
Cloud Security Engineer | OSCP | AWS Security Specialty | CySA+ | Threat Detection & Incident Response
Feel free to reachout on LinkedIn or any of my socials in case you need help with the challenge. The full writeup will be released after the box is retired.
HackTheBox: Logging
HackTheBox: Logging
Unauthenticated Enumeration, generate ticket using the found creds. Abuse shadow credential to reset msa_health and get initial foothold. Lateral movement through dll injection and privilege escalation via AD CS (ESC1) and WSUS abuse.
HackTheBox: Silentium
HackTheBox: Silentium
Unauathorized account takeover, leading to RCE in FLOWISEAI, reused passwords, insecure password storage. Arbitrary write using symlinks and PUT operation.
HackTheBox: Garfield
HackTheBox: Garfield
Initial Foothold via batch script, abusing ForceChangePassword privilege to move laterally. Ligolo to pivot to RODC, Domain compromise via RODC Keylist Abuse.
HackTheBox: devarea
HackTheBox: devarea
Initial foothold by leaking credentials using SSRF from Apache CXF, and using creds to execute RCE on Hoverfly dashboard. Privilege escalation via, exploiting the world writable bash and executing the syswatch script.
HackTheBox: kobold
HackTheBox: kobold
Initial Foothold via MCPJam RCE, LFI2RCE via privatebin resulting in compromise of stored credentials.Privilege escalation via Arcane container Orchaestration platform.
HackTheBox: VariaType
HackTheBox: VariaType
Initial access via LFI2RCE, lateral movement via cronjob and privilege escalation via vulnerable binary
HackTheBox: cctv
HackTheBox: cctv
Data Leak via authenticated SQLi leading to initial foothold, Privileges were escalated using RCE via motionEye running as a superuser.
HackTheBox: pirate
HackTheBox: pirate
Pirate blog will be posted later
HackTheBox: interpreter
HackTheBox: interpreter
Initial Foothold via Mirth Connect RCE moving laterally by craacking the user hash from db. Privilege escalation via XXE.
HackTheBox: wingdata
HackTheBox: wingdata
Initial foothold via unauthenticated RCE on WingData, lateral movement via cracking user password from DB. Privilege Escalation via tarslip, soft link, hard link and filter bypass.
HackTheBox: Pterodactyl
HackTheBox: Pterodactyl
Problem of future arbaaz
HackTheBox: Facts
HackTheBox: Facts
Improperly Controlled Modification of Dynamically-Determined Object Attributes allows privilege escalation to admin user leading to exfiltrating SSH keys from S3 Bucket and getting become the Root user by privilege escalation via misconfigured SUID