HTB – Conversor (Pentest Study)

2025-12-16

A root-executed needrestart trusted a user-controlled PYTHONPATH, allowing a malicious native Python module to be loaded as root and yielding instant full privilege escalation.

HTB – Imagery (Pentest Study)

2025-12-11

A leaked session cookie cascaded into LFI, web RCE, and—through weak credentials and a flawed root cron tool—full root compromise.

HTB – MonitorsFour (Pentest Study)

2025-12-10

Misconfigured environment files and weak application logic enabled a chained attack from initial web access to full Windows host compromise through Cacti RCE and Docker API abuse.

HTB – ReactOOPS (Web Study)

2025-12-08

React2Shell turns React Flight’s unsafe deserialization into a clean exploit chain—prototype poisoning → Function constructor → child_process.execSync—allowing full server-side RCE from a single crafted Flight payload.

HTB – ReMeeting The Wheel (Crypto Study)

2025-12-07

By exploiting RSA’s multiplicative homomorphism and the tiny structured key space, a meet-in-the-middle attack reconstructs the AES key without breaking RSA, allowing full decryption of the FLAG.

HTB – Expressway (Pentest Study)

2025-12-04

Notes covering IKE enumeration, PSK hash cracking, and sudo CVE-based root escalation.

HTB – Cap (Pentest Study)

2025-12-02

Pentest walkthrough including enumeration, PCAP analysis, credential extraction, and cap_setuid priv-esc.