Recent Notes
keepalive.sh blog

my notes on ctf challenges and whatever im learning

Navigation
Home Archive RSS
Categories
note
hackthebox
academy
writeup
hackthebox
machine

No matches found.

infosec
Manage vaults...
Recent Notes
02-03-2026 / 5 min read

HackTheBox Academy - Information Gathering - Web Edition

This module equips learners with essential web reconnaissance skills, crucial for ethical hacking and penetration testing. It explores both active and passive techniques, including DNS enumeration, web crawling, analysis of web archives and HTTP headers, and fingerprinting web technologies.

#htb #hackthebox #academy #note #information #gathering +2
Read note
28-02-2026 / 28 min read

HackTheBox Academy - Footprinting

Introinformation gathering using active (scans) and passive (use of third-party providers) methods. Enumeration Mythology Infrastructure Based EnumerationDomain Informationpassivel…
#htb #hackthebox #academy #note #footprinting
Read note
26-02-2026 / 6 min read

HackTheBox - Conversor

A Linux machine where an XSLT stylesheet processor accepts attacker-controlled input — and the ability to write arbitrary files, combined with a scheduled task and a vulnerable system utility, leads to root.

#htb #hackthebox #ctf #writeup #ffuf #linux +14
Read note
24-02-2026 / 9 min read

HackTheBox - Eighteen

A Windows domain controller where SQL Server impersonation exposes a cracked hash — and a recently disclosed Active Directory attack against delegated service accounts enables a complete domain takeover.

#htb #hackthebox #ctf #writeup #windows #hashcat +20
Read note
22-02-2026 / 7 min read

HackTheBox - Interpreter

A healthcare integration platform exposes an unpatched RCE, but cracking a non-standard password scheme is only the halfway point — getting to root means finding the flaw hidden inside a server that claims to be safe.

#htb #hackthebox #writeup #hashcat
Read note
19-02-2026 / 6 min read

HackTheBox - GoodGames

A Linux machine where weak database security and an internal admin panel lead to a foothold, with a creative Docker escape to reach the host as root.

#htb #hackthebox #ctf #writeup #linux #hashcat +16
Read note
19-02-2026 / 10 min read

HackTheBox - Help

A Linux machine where a help desk application’s unauthenticated GraphQL endpoint exposes user credentials — and an authenticated SQL injection, combined with an older kernel vulnerability, escalates to root.

#htb #hackthebox #writeup #ffuf #linux #sqlmap +2
Read note
18-02-2026 / 6 min read

HackTheBox - Curling

A Linux machine running a Joomla site where a hint hidden in the page source leads to credentials — and a password buried under layers of nested compression unlocks a path to a higher-privilege user.

#htb #hackthebox #ctf #writeup #linux
Read note
17-02-2026 / 4 min read

HackTheBox - Shocker

A Linux machine where directory enumeration uncovers a CGI script in an exposed cgi-bin directory — and a classic Bash vulnerability allows injecting commands through a crafted HTTP header.

#htb #hackthebox #ctf #writeup #ffuf #linux
Read note
17-02-2026 / 6 min read

HackTheBox - Valentine

A Linux machine named after its core vulnerability — a memory disclosure flaw in OpenSSL leaks just enough data to decrypt an encrypted RSA key found hiding in the web server’s directory listing.

#htb #hackthebox #ctf #writeup #ffuf #linux
Read note
Newer
1 2 3 4 5
Older
htb 47 writeup 43 ctf 41 hackthebox 31 linux 20 ffuf 11 hashcat 11 windows 10 privilege-escalation 8 ssh 5 msfvenom 5 academy 4 note 4 apache 4 password-cracking 4 crackmapexec 3 evil-winrm 3 password-reuse 3 sqlmap 3 smbclient 2 impacket-secretsdump 2 ftp 2 hardcoded-credentials 2 sudo-abuse 2 ubuntu 2 sql-injection 2 command-injection 2 suid 2 md5 2 python 2 metasploit 2 active-directory 2 domain-controller 2 kerberos 2 pass-the-hash 2 chisel 2 proxychains 2 impacket 2 netexec 2 john 2 docker 2 docker-escape 2 nginx 2 vhost-enumeration 2 footprinting 1 information 1 gathering 1 web 1 edition 1 rpcinfo 1 showmount 1 mount 1 umount 1 ghidra 1 cookie-editor 1 netcat 1 jd-gui 1 psql 1 mysql 1 keepass 1 putty 1 mdbtools 1 pst-utils 1 smbmap 1 gpp-decrypt 1 impacket-GetUserSPNs 1 impacket-psexec 1 ldapsearch 1 smbpasswd 1 baby 1 qemu-nbd 1 elastix 1 lfi 1 local-file-inclusion 1 voip 1 asterisk 1 webmin 1 legacy-tls 1 centos 1 wordpress 1 minecraft 1 directory-enumeration 1 jar-decompilation 1 jadx 1 java 1 phpmyadmin 1 zoneminder 1 CVE-2024-51482 1 bcrypt 1 port-forwarding 1 motioneye 1 CVE-2025-60787 1 authenticated-rce 1 xslt-injection 1 file-write 1 exslt 1 cronjob-abuse 1 reverse-shell 1 sqlite 1 needrestart 1 CVE-2024-48990 1 iis 1 anonymous-ftp 1 file-upload 1 aspx 1 meterpreter 1 ms10-015 1 kitrap0d 1 local-exploit-suggester 1 windows-server-2008 1 mssql 1 sql-impersonation 1 pbkdf2 1 rid-brute-force 1 winrm 1 bad-successor 1 dmsa 1 s4u2self 1 dcsync 1 windows-server-2025 1 facts 1 aws 1 flask 1 werkzeug 1 ssti 1 server-side-template-injection 1 jinja2 1 subdomain-enumeration 1 hash-identifier 1 golang 1 privatebin 1 mcp 1 CVE-2026-23744 1 unauthenticated-rce 1 operator-group 1 volume-mount 1 git 1 xfreerdp 1 fscan 1 monitorsfour 1 smb 1 ldap 1 kerberoasting 1 pre2k 1 pre-windows-2000 1 gmsa 1 gmsa-dump 1 ntlm-relay 1 rbcd 1 resource-based-constrained-delegation 1 coercion 1 s4u2proxy 1 spn-manipulation 1 bloodhound 1 lateral-movement 1 windows-server-2019 1 hyper-v 1 internal-network 1 kubernetes 1 minikube 1 etcd 1 kubelet 1 kubelet-api 1 misconfiguration 1 unauthenticated-access 1 service-account-token 1 privileged-pod 1 container-escape 1 hostpath-mount 1 twomillion 1 commix 1 git-exposed 1 git-dumper 1 fonttools 1 CVE-2025-66034 1 arbitrary-file-write 1 webshell 1 fontforge 1 CVE-2024-25082 1 setuptools 1 CVE-2025-47273 1 path-traversal 1 ssh-key-injection 1 php 1 whatweb 1 pspy 1

Vaultex

Version 1.0

Theme repository
View the source code, report issues, and contribute to the theme on GitHub.
Visit
Hexo framework
Hexo is a fast, simple, and powerful blog framework that powers this site.
Visit
Discussions
Ask questions, share ideas, and have in-depth discussions about the theme on GitHub.
Join
    ↑↓ to navigate ↵ to open ctrl ↵ to open in new tab esc to dismiss