HackTheBox - CozyHosting
A Linux machine where an exposed Spring Boot actuator endpoint leaks an admin session token — and an SSH username injection flaw, combined with decompiled application source, chains into root access.
A Linux machine where an exposed Spring Boot actuator endpoint leaks an admin session token — and an SSH username injection flaw, combined with decompiled application source, chains into root access.
A Linux machine where insecure direct object references expose files belonging to other users — and a chain of archived databases, cracked hashes, and a version history leak lead to code execution as root.
A Linux machine where a support ticketing system’s default credentials expose sensitive internal notes — and a memory disclosure vulnerability in a password manager leaks the master key protecting a root SSH key.
A Windows Active Directory machine where database server features leak website backup archives — and a misconfigured certificate authority turns limited domain access into full administrator control.
A Linux machine where a WordPress plugin’s SQL injection leaks database credentials — and an XML external entity vulnerability in the media upload handler reveals FTP credentials from a configuration file.
A Linux machine where a blogging platform’s permissive file upload allows a PHP webshell — and a world-writable script with sudo rights closes out the privilege escalation.
A Linux machine where credentials hidden in a JavaScript source file open an image processing application — and two separate but classic misconfigurations chain together for full system compromise.
Version 1.0