<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Htb on v4lle&#39;s Blog</title>
    <link>/tags/htb/</link>
    <description>Recent content in Htb on v4lle&#39;s Blog</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Tue, 07 Apr 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="/tags/htb/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>HackTheBox Fluffy Writeup</title>
      <link>/posts/fluffy/</link>
      <pubDate>Tue, 07 Apr 2026 00:00:00 +0000</pubDate>
      <guid>/posts/fluffy/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;/posts/fluffy/fluffy.png&#34; alt=&#34;fluffy&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;Fluffy is an Easy-rated Windows machine and my first box from the new CPTS Preparation Track on HackTheBox. It&amp;rsquo;s a great box if you want to get hands-on with modern Active Directory attacks. We start from an assumed-breach perspective, inject a crafted .library-ms file via an SMB share to harvest NTLM hashes, and continue by abusing Generic Write privileges through Shadow Credentials. The final step to Domain Takeover is exploiting an AD CS ESC16 vulnerability.&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackTheBox CodePartTwo Writeup</title>
      <link>/posts/codeparttwo/</link>
      <pubDate>Wed, 04 Feb 2026 00:00:00 +0000</pubDate>
      <guid>/posts/codeparttwo/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;/posts/codeparttwo/codeparttwo.png&#34; alt=&#34;codeparttwo&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;CodePartTwo is an easy difficulty Linux machine featuring a web-based JavaScript editor. The core of this challenge revolves around the &amp;ldquo;Run Code&amp;rdquo; functionality - a feature that is inherently dangerous if not properly isolated.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;-enumeration&#34;&gt;🕵️ Enumeration&lt;/h2&gt;&#xA;&lt;p&gt;After spawning the machine and connecting to the VPN, we start with the initial enumeration.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;-initial-nmap-scan&#34;&gt;🔍 Initial Nmap Scan&lt;/h2&gt;&#xA;&lt;p&gt;Like always, we start by running an initial nmap scan to identify open ports:&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackTheBox Editor Writeup</title>
      <link>/posts/editor/</link>
      <pubDate>Wed, 10 Dec 2025 00:00:00 +0000</pubDate>
      <guid>/posts/editor/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;/posts/editor/editor.png&#34; alt=&#34;editor&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Editor&lt;/strong&gt; is an easy Linux machine running a vulnerable version of XWiki that allows unauthenticated remote code execution, providing an initial foothold. Enumeration of the system reveals a misconfigured SUID binary, which can be exploited to escalate privileges and gain root access.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;-enumeration&#34;&gt;🕵️ Enumeration&lt;/h2&gt;&#xA;&lt;p&gt;After spawning the machine and connecting to the VPN, we start with the initial enumeration.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;-initial-nmap-scan&#34;&gt;🔍 Initial Nmap Scan&lt;/h2&gt;&#xA;&lt;p&gt;We begin by running an initial nmap scan with the following command:&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackTheBox Cap Writeup</title>
      <link>/posts/cap/</link>
      <pubDate>Mon, 27 Oct 2025 00:00:00 +0000</pubDate>
      <guid>/posts/cap/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;/posts/cap/cap.png&#34; alt=&#34;cap&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Cap&lt;/strong&gt; is an easy difficulty Linux machine running an HTTP server that performs administrative functions including performing network captures. Improper controls result in Insecure Direct Object Reference (IDOR) giving access to another user&amp;rsquo;s capture. The capture contains plaintext credentials and can be used to gain foothold. A Linux capability is then leveraged to escalate to root.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;-enumeration&#34;&gt;🕵️ Enumeration&lt;/h2&gt;&#xA;&lt;p&gt;After spawning the machine and connecting to the VPN, we start with the initial enumeration.&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackTheBox Optimum Writeup</title>
      <link>/posts/optimum/</link>
      <pubDate>Sat, 13 Sep 2025 00:00:00 +0000</pubDate>
      <guid>/posts/optimum/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;/posts/optimum/optimum.png&#34; alt=&#34;optimum&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Optimum&lt;/strong&gt; is a beginner-level machine which mainly focuses on enumeration of services with known exploits. Both exploits are easy to obtain and have associated Metasploit modules, making this machine fairly simple to complete.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;-enumeration&#34;&gt;🕵️ Enumeration&lt;/h2&gt;&#xA;&lt;p&gt;After spawning the machine and connecting to the VPN, we start with the initial enumeration.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;-initial-nmap-scan&#34;&gt;🔍 Initial Nmap Scan&lt;/h2&gt;&#xA;&lt;p&gt;We begin by running an initial nmap scan with the following command:&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;nmap -sC -sV -vv -oA nmap/initial_scan &amp;lt;Target-IP&amp;gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;-sC&lt;/code&gt; Default script scan&lt;/li&gt;&#xA;&lt;li&gt;&lt;code&gt;-sV&lt;/code&gt; Service version detection&lt;/li&gt;&#xA;&lt;li&gt;&lt;code&gt;-vv&lt;/code&gt; Verbose output&lt;/li&gt;&#xA;&lt;li&gt;&lt;code&gt;-oA&lt;/code&gt; Output all formats&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;Nmap reports only Port 80 open:&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackTheBox Getting Started Writeup</title>
      <link>/posts/getting-started/</link>
      <pubDate>Wed, 13 Aug 2025 00:00:00 +0000</pubDate>
      <guid>/posts/getting-started/</guid>
      <description>&lt;p&gt;Getting Started is not really a box on HTB Labs, it is just a knowledge check in the Getting Started module of the Penetration Tester Job Role Path, but I am writing a Writeup about it anyway.&lt;/p&gt;&#xA;&lt;h2 id=&#34;-enumeration&#34;&gt;🕵️ Enumeration&lt;/h2&gt;&#xA;&lt;p&gt;After spawning the machine and connecting to the VPN, we start with the initial enumeration.&lt;/p&gt;&#xA;&lt;h2 id=&#34;-initial-nmap-scan&#34;&gt;🔍 Initial Nmap Scan&lt;/h2&gt;&#xA;&lt;p&gt;We begin by running an initial nmap scan with the following command:&lt;/p&gt;</description>
    </item>
    <item>
      <title>HackTheBox Nibbles Writeup</title>
      <link>/posts/nibbles/</link>
      <pubDate>Fri, 08 Aug 2025 00:00:00 +0000</pubDate>
      <guid>/posts/nibbles/</guid>
      <description>&lt;p&gt;&lt;img src=&#34;/posts/nibbles/nibbles.png&#34; alt=&#34;nibbles&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;nibbles&lt;/strong&gt; is a fairly simple machine, however with the inclusion of a login blacklist, it is a fair bit more challenging to find valid credentials. luckily, a username can be enumerated and guessing the correct password does not take long for most. This is my first box and also my first writeup.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;-enumeration&#34;&gt;🕵️ Enumeration&lt;/h2&gt;&#xA;&lt;p&gt;After spawning the machine and connecting to the VPN, we start with the initial enumeration.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
