In this blog, we dive into a Server Operator exploit scenario for Windows Privilege Escalation, leveraging the commonly overlooked but powerful Server Operator group in
GoodGames is a Linux machine and is considered an easy box. but it was tricky indeed. On this box, we will begin with a basic
Paper is regarded as a simple box, or hackthebox, that runs Linux. We’ll start with a simple port scan on this box and proceed laterally.
Hack the box considers Pandora, a Linux computer, to be a simple box, but it isn’t. Instead of depending just on TCP port results, we
The driver is an easy-rated Windows box on the HackTheBox platform. This is designed to understand initial exploitation using an SCF file and further escalate
Timelapse is an HTB Active Directory machine that is an easy machine but as the concept of initial compromise is unique, therefore, I believe it
Return is a Windows machine on HTB and is rated as easy, this box is designed over windows that have Weak Service Permission. If summarized,
This article talks about Trivy, which is a simple and comprehensive vulnerability scanner for containers and other artifacts, suitable for Continuous Integration and Testing. Table
Mimikatz for Pentester: Kerberos is a powerful tool used in penetration testing to exploit vulnerabilities in the Kerberos authentication protocol. In this article, we will