โš”๏ธ

Red Team Operations

Penetration Testing & Offensive Security Research

HTB Season 9 Top 1% (Holo) ranking through systematic exploitation of Active Directory environments, web applications, container escapes, and privilege escalation chains. Demonstrating attacker TTPs to strengthen defensive capabilities.

HTB Season 9 ranked, Active Directory specialist, and offensive security researcher focused on realistic attack simulations and security assessments.

Active hands-on training across industry-leading cybersecurity platforms

๐Ÿ† Holo
Season 9 (Top 1%)
30+
Seasonal Boxes
50+
Retired Boxes

๐ŸŽ“ Offensive Security Certifications

CPTS

CPTS

HTB Certified Penetration Testing Specialist

Verify โ†’
BSCP

BSCP

Burp Suite Certified Practitioner

Verify โ†’
CWES

CWES

Certified Web Exploitation Specialist

Verify โ†’
eJPT

eJPT

Junior Penetration Tester

Verify โ†’

โญ Featured Achievement

๐Ÿ† Seasonal Performance

Season Tier Proof Achievement Link
HTB Season 9 โ€“ Season of the Gacha ๐Ÿ† Holo (Top ~1%) HTB Season 9 โ€“ Season of the Gacha proof Rank: 95 / 9850 (Top ~0.96%) โ€ข Users: 13 / 13 โ€ข Systems: 13 / 13 View
HTB Season 8 โ€“ Depths ๐Ÿ† Platinum (Top ~9%) HTB Season 8 โ€“ Depths proof Rank: 739 / 8036 (Top ~9.19%) โ€ข Users: 10 / 13 โ€ข Roots: 10 / 13 View
</div>

๐Ÿ—“๏ธ HTB Seasonal Boxes

Current and recent seasonal boxes demonstrating Active Directory exploitation, web application security, container escapes, and multi-stage attack chains.

Machine Difficulty Status Proof Writeup Summary
Facts Easy โœ… Done Proof for Facts View
View chain
Camaleon CMS IDOR vulnerability in user profile management โ†’ privilege escalation to administrator role โ†’ S3-compatible MinIO credentials exposed in CMS configuration โ†’ AWS CLI enumeration of internal buckets โ†’ SSH private key extraction from object storage โ†’ passphrase cracking with John the Ripper โ†’ SSH access as trivia user โ†’ sudo permissions on facter utility โ†’ arbitrary code execution via custom Ruby facts โ†’ root shell.
HTB Season 9 โ€“ Season of the Gacha Season ๐Ÿ† Holo Proof for HTB Season 9 โ€“ Season of the Gacha View
View chain
Rank: 95 / 9850 Players โ€ข Roots: 13 / 13 โ€ข Users: 13 / 13 (Top ~1%)
Eloquia Insane โœ… Done Proof for Eloquia View
View chain
Multi-layer enterprise compromise: web logic flaws โ†’ containerised service abuse โ†’ trust boundary violations โ†’ host-level escalation through operational tooling โ†’ persistence via insecure custom services, resulting in complete SYSTEM control.
MonitorsFour Easy โœ… Done Proof for MonitorsFour View
View chain
Configuration leak leads to authentication bypass โ†’ admin access in a monitoring platform โ†’ remote code execution inside a container โ†’ abuse of exposed container management interfaces to escape isolation and gain full control of the Windows host.
Gavel Medium โœ… Done Proof for Gavel View
View chain
Leaked application source โ†’ logic-level SQL injection โ†’ credential recovery โ†’ administrative feature abuse โ†’ arbitrary rule execution โ†’ privilege escalation via a misdesigned setuid client communicating with a root-owned daemon.
Fries Hard โœ… Done Proof for Fries View
View chain
Hybrid Linux/Windows environment compromise: source-code disclosure โ†’ container service abuse โ†’ credential harvesting via internal tooling โ†’ Active Directory escalation using identity misconfiguration and certificate trust abuse to reach domain admin.
Eighteen Easy โœ… Done Proof for Eighteen View
View chain
Valid low-priv access โ†’ MSSQL data exposure โ†’ application credential recovery โ†’ lateral movement via remote management โ†’ modern AD abuse to escalate from user to full domain compromise.
NanoCorp Hard โœ… Done Proof for NanoCorp View
View chain
Corporate Windows AD attack chain: external web service abuse โ†’ credential exposure and reuse โ†’ AD enumeration with delegated rights โ†’ controlled account manipulation โ†’ SYSTEM-level escalation through insecure monitoring infrastructure.
Giveback Medium โœ… Done Proof for Giveback View
View chain
Web application foothold via third-party plugin abuse โ†’ containerised environment enumeration โ†’ credential leakage through service configuration โ†’ pivot across internal services and escape container boundaries โ†’ leverage privileged runtime components to gain root on the host.
Conversor Medium-Hard โœ… Done Proof for Conversor View
View chain
Web file-transform parser abuse: exploit server-side upload/processing to gain a foothold, recover forgotten local DB/config secrets and reused credentials, then leverage sudo/service misconfigurations for a clean privilege escalation to root.
Hercules Insane โœ… Done Proof for Hercules View
View chain
Identity-first AD / PKI chain: initial foothold โ†’ enumerate AD ACLs and certificate templates โ†’ abuse delegated rights to enable/reset accounts and modify OU ACLs โ†’ request certificates (on-behalf-of flows) and export PFXs โ†’ convert PFX โ†’ PEM โ†’ PKINIT to get ccaches/TGTs โ†’ use tickets or client-cert auth to get WinRM shells โ†’ reset service account passwords, harvest machine/service keys and use Impacket (changepasswd/getST) and S4U/S4U2Proxy to impersonate Administrator and own the domain.
Signed Medium โœ… Done Proof for Signed View
View chain
MSSQL extended-proc enumeration โ†’ trigger SMB callback to capture service NTLMv2 โ†’ crack service hash โ†’ convert hex SIDs & craft Kerberos silver ticket for MSSQL SPN โ†’ use forged ticket to gain dbo/sysadmin โ†’ xp_cmdshell / OPENROWSET to read flags and pivot to domain.
DarkZero Hard โœ… Done Proof for DarkZero View
View chain
Split-horizon DNS + linked MSSQL servers โ†’ xp_cmdshell foothold โ†’ Meterpreter โ†’ flaky kernel exploit (CVE-2024-30088) or hash-dump fallback โ†’ Rubeus ticket capture (xp_dirtree) + pivots โ†’ Domain Admin.
Imagery Medium โœ… Done Proof for Imagery View
View chain
Image transform RCE โ†’ shell as web user โ†’ decrypt readable backup to recover creds โ†’ sudo /usr/local/bin/charcol scheduling abuse โ†’ root.
Expressway Easy โœ… Done Proof for Expressway View
View chain
IKE Aggressive Mode PSK crack โ†’ SSH as ike โ†’ sudo -h offramp.expressway.htb โ†’ root.
HTB Season 8 โ€“ Depths Season ๐Ÿ† Platinum Proof for HTB Season 8 โ€“ Depths View
View chain
Rank: 739 / 8036 (Top ~9%) โ€ข Roots: 10 / 13 โ€ข Users: 10 / 13
Cobblestone Hard โœ… Done Proof for Cobblestone View
View chain
Web foothold โ†’ DB creds โ†’ SSH tunnel to XML-RPC service โ†’ Arbitrary file leak โ†’ Root
Editor Easy โœ… Done Proof for Editor View
View chain
nvme compile bug โ†’ binary patch โ†’ buffer overflow โ†’ ROP โ†’ reverse shell โ†’ proof
Era Medium โœ… Done Proof for Era View
View chain
Subdomain fuzz โ†’ SSRF via download preview โ†’ DB leak โ†’ web RCE โ†’ SUID bash โ†’ ASN1 signature bypass โ†’ root.txt
Mirage Hard โœ… Done Proof for Mirage View
View chain
GetNPUsers โ†’ Kerberos ticket crack โ†’ shadow credentials โ†’ ESC1 abuse via Certipy โ†’ DA hash โ†’ root.txt
Outbound Easy โœ… Done Proof for Outbound View
View chain
Web creds reuse โ†’ Roundcube RCE โ†’ container escape โ†’ MySQL plaintext leak โ†’ symlink overwrite to /etc/passwd โ†’ root
Voleur Medium โœ… Done Proof for Voleur View
View chain
Kerberos TGT โ†’ SMB creds โ†’ DPAPI masterkey + creds โ†’ BloodHound path โ†’ SSH via id_rsa โ†’ Registry + NTDS.dit โ†’ secretsdump โ†’ getTGT โ†’ Domain Admin
RustyKey Hard โœ… Done Proof for RustyKey View
View chain
WinRM creds โ†’ BloodHound edge โ†’ GenericWrite โ†’ password reset โ†’ ProtectedUsers removal โ†’ S4U2Proxy โ†’ Domain Admin
Artificial Easy โœ… Done Proof for Artificial View
View chain
TensorFlow RCE via model โ†’ SQLite loot โ†’ MD5 crack โ†’ RESTIC trick โ†’ SUID bash root
Sorcery Insane โœ… Done Proof for Sorcery View
View chain
Git leak โ†’ passkey bypass โ†’ Kafka RCE โ†’ Docker registry โ†’ IPA privesc
TombWatcher Hard โœ… Done Proof for TombWatcher View
View chain
gMSA abuse โ†’ ACL pivot โ†’ deleted obj restore โ†’ CVE โ†’ Domain Admin
Fluffy Hard โœ… Done Proof for Fluffy View
View chain
NTLMv2 โ†’ shadow creds โ†’ ADCS ESC1 โ†’ Pass-the-Cert โ†’ Domain Admin
Puppy Medium โœ… Done Proof for Puppy View
View chain
LDAP โ†’ KeePass โ†’ password reset โ†’ DPAPI secrets โ†’ NTDS.dit dump
Certificate Medium โœ… Done Proof for Certificate View
View chain
Cert template abuse โ†’ Certipy โ†’ Evil-WinRM โ†’ Administrator shell

Seasonal tally: 29 boxes โ€” โœ… 27 completed ยท ๐ŸŸฉ 7 easy ยท ๐ŸŸจ 9 medium ยท ๐ŸŸฅ 9 hard ยท ๐ŸŸช 3 insane

๐Ÿ“ฆ HTB Retired Boxes

Full write-ups available for all retired boxes covering diverse attack techniques and methodologies.

Machine Difficulty Status Proof Writeup Summary
Lock Easy โœ… DoneProof for LockView
View chain โ–ถ
Gitea CI/CD abuse โ†’ ASPX webshell โ†’ RDP creds via mRemoteNG config โ†’ PDF24 CVEโ€‘2023โ€‘49147 oplock โ†’ SYSTEM shell โ†’ Root flag
Code Easy โœ… DoneProof for CodeView
View chain โ–ถ
SQLi โ†’ MD5 crack โ†’ path traversal โ†’ SSH โ†’ root
Sauna Easy โœ… DoneProof for SaunaView
View chain โ–ถ
ASREPRoast โ†’ WinRM โ†’ winPEAS โ†’ autologon creds โ†’ DCSync via BloodHound โ†’ psexec w/ Admin hash โ†’ root.txt
Kryptos Support Medium โœ… DoneProof for Kryptos SupportView
View chain โ–ถ
OAuth token leak โ†’ IDOR โ†’ XSS โ†’ JWT tamper โ†’ GPG decrypt โ†’ flag
Unicode Medium โœ… DoneProof for UnicodeView
View chain โ–ถ
JWT forgery โ†’ Host-split Unicode LFI โ†’ SSH as `code` โ†’ Python bin reverse via `pyinstxtractor` โ†’ root.txt
Sau Easy โœ… DoneProof for SauView
View chain โ–ถ
SSRF (CVE-2023-27163) โ†’ Maltrail unauth RCE โ†’ Shell as `puma` โ†’ `sudo systemctl` โ†’ root.txt
Support Medium โœ… DoneProof for SupportView
View chain โ–ถ
Kerberoast โ†’ AS-REP โ†’ impersonate S4U2Self โ†’ Rubeus abuse โ†’ Administrator shell
VulnEscape Easy โœ… DoneProof for VulnEscapeView
View chain โ–ถ
RDP login (KioskUser0:blank) โ†’ Edge `file://` escape โ†’ CMD rename bypass โ†’ RD+ creds โ†’ BulletPassView โ†’ `runas` โ†’ root.txt
Reset Easy โœ… DoneProof for ResetView
View chain โ–ถ
Password reset bypass โ†’ log poisoning RCE โ†’ rlogin + tmux hijack โ†’ sudo nano escape โ†’ root.txt
Ten Hard โœ… DoneProof for TenView
View chain โ–ถ
Web host creation โ†’ FTP traversal via DB edit โ†’ SSH key planting โ†’ Apache log pipe โ†’ root
Data Easy โœ… DoneProof for DataView
View chain โ–ถ
Grafana LFI โ†’ DB dump โ†’ SHA-256 password crack โ†’ Docker escape โ†’ root
Dog Easy โœ… DoneProof for DogView
View chain โ–ถ
Git repo dump โ†’ CMS RCE โ†’ PHP utility privilege escalation
Cat Medium โœ… DoneProof for CatView
View chain โ–ถ
Git repo leak โ†’ Stored XSS cookie theft โ†’ SQLite SQLi โ†’ Apache logs โ†’ Gitea XSS for privesc
Titanic Easy โœ… DoneProof for TitanicView
View chain โ–ถ
LFI โ†’ SQLite โ†’ Gitea โ†’ ImageMagick identify RCE โ†’ root
Administrator Medium โœ… DoneProof for AdministratorView
View chain โ–ถ
AD domain takeover โ†’ Kerberoast โ†’ DCSync โ†’ Admin hash
Beep Medium โœ… DoneProof for BeepView
View chain โ–ถ
vtigerCRM LFI โ†’ legacy creds reuse โ†’ root via SSH
Trick Medium โœ… DoneProof for TrickView
View chain โ–ถ
DNS & SQLi โ†’ email RCE โ†’ fail2ban privesc
Waldo Medium โœ… DoneProof for WaldoView
View chain โ–ถ
LFI โ†’ SSH key โ†’ restricted shell escape โ†’ cap_dac_read
Retro Medium โœ… DoneProof for RetroView
View chain โ–ถ
Certipy ESC1 abuse โ†’ machine account cert โ†’ auth + hashdump
Down Easy โœ… DoneProof for DownView
View chain โ–ถ
LFI โ†’ command injection โ†’ pswm decrypt โ†’ sudo full root
Lame Easy โœ… DoneProof for LameView
View chain โ–ถ
Samba usermap exploit โ†’ SYSTEM shell
Blue Easy โœ… DoneProof for BlueView
View chain โ–ถ
EternalBlue MS17-010 โ†’ SYSTEM shell
Optimum Easy โœ… DoneProof for OptimumView
View chain โ–ถ
Rejetto HFS RCE โ†’ SYSTEM with local tools
Bashed Easy โœ… DoneProof for BashedView
View chain โ–ถ
Web fuzzing โ†’ PHP webshell โ†’ privesc via script abuse
Chemistry Easy โœ… DoneProof for ChemistryView
View chain โ–ถ
File parser RCE โ†’ LFI โ†’ SSH key reuse
Headless Easy โœ… DoneProof for HeadlessView
View chain โ–ถ
Blind XSS โ†’ cookie theft โ†’ command injection โ†’ root
Alert Easy โœ… DoneProof for AlertView
View chain โ–ถ
Markdown XSS โ†’ LFI โ†’ group permission privesc
Writeup Easy โœ… DoneProof for WriteupView
View chain โ–ถ
CMS Made Simple SQLi โ†’ creds for jkr โ†’ PATH hijack via fake run-parts โ†’ root user injection โ†’ root.txt
Bastion Easy โœ… DoneProof for BastionView
View chain โ–ถ
SMB VHD โ†’ extract SAM+SYSTEM โ†’ crack creds โ†’ SSH as l4mpje โ†’ mRemoteNG config decrypt โ†’ Admin creds โ†’ root.txt
Starting Point (Tier 0โ€“2) Varied โœ… DoneProof for Starting Point (Tier 0โ€“2)โ€”
View chain โ–ถ
Fundamental HTB boxes covering web, SMB, SSH, JWT, privesc, and enumeration techniques โ€” perfect for new pentesters

Retired tally: 30 boxes โ€” โœ… 30 completed ยท ๐ŸŸฉ 19 easy ยท ๐ŸŸจ 9 medium ยท ๐ŸŸฅ 1 hard ยท ๐ŸŽ›๏ธ 1 varied

๐Ÿ”’ HTB Active Boxes

โš ๏ธ Write-ups withheld per HTB rules until box retirement. Proof screenshots demonstrate completion without revealing solutions.

Machine Difficulty Status Proof Writeup Summary
AirTouch Medium โœ… Done Proof for AirTouch View
View chain โ–ถ
SNMP credential disclosure โ†’ SSH access to consultant VLAN โ†’ WPA2-PSK handshake capture and crack โ†’ pivot to tablet management VLAN โ†’ web application file upload to RCE โ†’ credential harvesting from configuration files โ†’ evil twin attack against WPA2-Enterprise network โ†’ MSCHAPv2 hash capture and crack โ†’ access to corporate VLAN โ†’ plaintext credential extraction from hostapd authentication database โ†’ privilege escalation to root.
Browsed Medium โœ… Done Proof for Browsed View
View chain โ–ถ
Browser extension upload mechanism โ†’ client-side code execution in developer context โ†’ SSRF to localhost-only services โ†’ command injection via arithmetic evaluation in shell conditionals โ†’ Python bytecode cache poisoning to achieve root privilege escalation.
Overwatch Medium โœ… Done Proof for Overwatch View
View chain โ–ถ
Guest SMB access reveals .NET monitoring application โ†’ hardcoded MSSQL credentials in configuration โ†’ linked server enumeration discovers unreachable SQL07 โ†’ Active Directory DNS write permissions enable DNS poisoning โ†’ MITM attack captures cleartext credentials via Responder โ†’ WinRM access to domain โ†’ localhost WCF service discovery โ†’ reverse engineer SOAP contract from decompiled binary โ†’ PowerShell command injection in KillProcess method โ†’ SYSTEM shell.
HackNet Hard โœ… Done Proof for HackNet View
View chain โ–ถ
SSTI + IDOR foothold โ†’ world-writable Django cache โ†’ pickle RCE โ†’ GPG-encrypted DB backup โ†’ root.
Soulmate Easy โœ… Done Proof for Soulmate View
View chain โ–ถ
Subdomain discovery โ†’ CrushFTP CVE-2025-31161 โ†’ admin access โ†’ PHP webshell โ†’ SSH creds โ†’ Erlang shell โ†’ root
WhiteRabbit Insane โœ… Done Proof for WhiteRabbit View
View chain โ–ถ
Subdomain/service breadcrumbing โ†’ signed-webhook foothold โ†’ automation assist โ†’ backup workflow pivot โ†’ time-seeded randomness insight โ†’ final
DarkCorp Insane โณ Active Proof for DarkCorp View
View chain โ–ถ
Teaser only โ€” enterprise-style chain with careful web recon, internal pivoting, and identity-centric steps (no spoilers).
Guardian Hard โœ… Done Proof for Guardian View
View chain โ–ถ
Portal creds โ†’ SSH jamil โ†’ confs abuse โ†’ sudo safeapache2ctl โ†’ rootbash โ†’ root
Previous Medium โณ Active Proof for Previous View
View chain โ–ถ
Teaser โ€” modern web/API challenge; careful boundary checks and clean Linux escalation habits. Full write-up unlocks on retirement.
CodeTwo Easy โณ Active Proof for CodeTwo View
View chain โ–ถ
Teaser โ€” modern web app; targeted enum, boundary reading, and Linux privesc mindset. Full write-up unlocks on retirement.
Planning Easy โœ… Done Proof for Planning View
View chain โ–ถ
Subdomain โ†’ Grafana RCE โ†’ docker escape โ†’ SUID privesc
Nocturnal Easy โœ… Done Proof for Nocturnal View
View chain โ–ถ
File leak โ†’ admin panel RCE โ†’ DB hash โ†’ SSH โ†’ CVE โ†’ root
Environment Medium โœ… Done Proof for Environment View
View chain โ–ถ
Laravel env bypass โ†’ avatar RCE โ†’ vault โ†’ sudo abuse

Active tally: 13 boxes โ€” โœ… 10 completed ยท ๐ŸŸฉ 4 easy ยท ๐ŸŸจ 5 medium ยท ๐ŸŸฅ 2 hard ยท ๐ŸŸช 2 insane

๐Ÿข HTB Pro Labs

Multi-machine enterprise environments simulating real-world corporate networks, AD forests, and complex attack chains.

Lab Tier Status Proof Link Notes
Zephyr Pro Lab Completed Proof for Zephyr View
View notes โ–ถ
Perimeter foothold โ†’ multi-segment pivots โ†’ internal tooling abuse โ†’ AD enumeration โ†’ domain takeover.
Offshore Pro Lab Completed Proof for Offshore View
View notes โ–ถ
Perimeter recon โ†’ chained web footholds โ†’ pivots across segmented networks โ†’ AD enumeration/abuse โ†’ domain takeover.
FullHouse Mini Pro Lab Completed Proof for FullHouse View
View notes โ–ถ
Source review โ†’ web โ†’ AD โ†’ reversing โ†’ AI/chain โ€” fun glue lab.
Solar Mini Pro Lab Completed Proof for Solar View
View notes โ–ถ
Enumeration โ†’ situational awareness โ†’ FreeBSD exploitation โ†’ out-of-band data exfiltration โ†’ source code review โ€” tight, chain-heavy lab.
APTLabs Pro Lab Completed Proof for APTLabs View
View notes โ–ถ
External foothold โ†’ web โ†’ AD pivot โ†’ ACL abuse โ†’ DCSync โ†’ domain takeover.
Cybernetics Pro Lab Completed Proof for Cybernetics View
View notes โ–ถ
Web foothold โ†’ Kerberoast/AS-REP โ†’ constrained delegation โ†’ lateral movement โ†’ DA.
Dante Pro Lab Completed Proof for Dante View
View notes โ–ถ
Perimeter โ†’ Linux/Windows mixed estate โ†’ credential reuse โ†’ AD escalation โ†’ DA.
Fortress AWS Pro Lab Completed Proof for Fortress AWS View
View notes โ–ถ
IAM misconfigs โ†’ privilege escalation โ†’ S3/SSM pivoting โ†’ data exfil โ†’ persistence.
P.O.O Pro Lab Completed Proof for P.O.O View
View notes โ–ถ
SMB/SQL exposure โ†’ xp_cmdshell โ†’ potato to SYSTEM โ†’ AD pathing โ†’ DA.
RastaLabs Pro Lab Completed Proof for RastaLabs View
View notes โ–ถ
Classic AD: password spray โ†’ AS-REP/Kerberoast โ†’ BloodHound path โ†’ DCSync.
Wanderer Pro Lab Completed Proof for Wanderer View
View notes โ–ถ
Web foothold โ†’ container/segmentation escape โ†’ AD pivot โ†’ privesc chain โ†’ DA.

ProLabs tally: 11 boxes โ€” โœ… 11 completed ยท ๐ŸŸฉ 0 easy ยท ๐ŸŸจ 0 medium ยท ๐ŸŸฅ 0 hard

๐ŸŒ Other Platforms

Penetration testing practice across TryHackMe, ProvingGrounds, and other offensive security platforms.

๐Ÿงช Proving Grounds (PG) Boxes

Box Difficulty Status Proof Link Notes
Twiggy Easy โœ… Done Proof for Twiggy View
View notes โ–ถ
SaltStack CVE-2020-11652 RCE โ†’ Root Shell
ClamAV Easy โœ… Done Proof for ClamAV View
View notes โ–ถ
SNMP leaks clamav-milter โ†’ CVE-2007-4560 Sendmail RCE โ†’ inetd shell โ†’ Root
Mice Easy โœ… Done Proof for Mice View
View notes โ–ถ
RemoteMouse 3.008 RCE โ†’ FileZilla creds โ†’ GUI LPE to SYSTEM

๐Ÿงช TryHackMe (THM) Boxes

Box Difficulty Status Proof Link Notes
FusionCorp Hard โœ… Done Proof for FusionCorp View
View notes โ–ถ
/backup leak โ†’ AS-REP roast (lparker) โ†’ crack โ†’ LDAP desc creds (jmurphy) โ†’ Evil-WinRM โ†’ SeBackupPrivilege (Backup Operators) โ†’ Diskshadow VSS โ†’ NTDS dump โ†’ Administrator hash โ†’ wmiexec โ†’ root
Ledger Hard โœ… Done Proof for Ledger View
View notes โ–ถ
LDAP creds in description โ†’ Password spray (CHANGEME2023!) โ†’ RDP foothold โ†’ ADCS ESC1 abuse via Certipy โ†’ Pivot to BRADLEY_ORTIZ โ†’ PsExec โ†’ DA shell
Services Medium โœ… Done Proof for Services View
View notes โ–ถ
User enum from website โ†’ Kerbrute โ†’ AS-REP roast (j.rock) โ†’ WinRM โ†’ Server Operators service abuse โ†’ SYSTEM
LazyAdmin Easy โœ… Done Proof for LazyAdmin View
View notes โ–ถ
/SweetRice /content/inc backup leak โ†’ MD5 crack (manager) โ†’ /content/as admin โ†’ PHP upload โ†’ webshell โ†’ sudo perl backup.pl โ†’ overwrite /etc/copy.sh โ†’ root
ArchAngel Easy โœ… Done Proof for ArchAngel View
View notes โ–ถ
/LFI on /test.php?view= โ†’ Apache log poisoning via User-Agent โ†’ RCE (www-data) โ†’ cron overwrite /opt/helloworld.sh โ†’ SUID PATH hijack ( ~/secret/backup calls cp ) โ†’ root
Attacktive Directory Easy โœ… Done Proof for Attacktive Directory View
View notes โ–ถ
Kerbrute userenum โ†’ AS-REP roast โ†’ SMB loot โ†’ backup creds โ†’ RDP โ†’ secretsdump โ†’ psexec โ†’ root.txt
VulnNet: Roasted Easy โœ… Done Proof for VulnNet: Roasted View
View notes โ–ถ
SMB enum โ†’ AS-REP roast โ†’ user shell via WinRM โ†’ SYSVOL creds โ†’ DA hash dump โ†’ root.txt
Corp Easy โœ… Done Proof for Corp View
View notes โ–ถ
AppLocker bypass โ†’ Kerberoast โ†’ crack hash โ†’ find creds in unattended.xml โ†’ psexec as Administrator

๐Ÿงช HackSmarter Labs

Box Difficulty Status Proof Link Notes
BuildingMagic Medium โœ… Done Proof for BuildingMagic View
View notes โ–ถ
AS-REP/Kerberoast โ†’ foothold โ†’ BloodHound path โ†’ DA
ShareThePain Medium โœ… Done Proof for ShareThePain View
View notes โ–ถ
MSSQL exec โ†’ SYSTEM (potato) โ†’ copy root.txt; optional ligolo-ng pivot
PivotSmarter Basic โœ… Done Proof for PivotSmarter View
View notes โ–ถ
SOCKS/TUN pivots (ligolo-ng/chisel) โ†’ internal subnet enum โ†’ multi-hop routes โ†’ AD reachability & lateral movement

๐Ÿ“‹ Featured Case Study

VPN Compromise & Privilege Escalation

Structured penetration test case study demonstrating attack methodology from external reconnaissance through full host compromise, written from a defensive perspective.

Attack Chain:

  1. Enumeration: IKE Aggressive Mode discovery on VPN endpoint
  2. Credential Recovery: PSK extraction and offline cracking
  3. Initial Access: VPN authentication with recovered credentials
  4. Privilege Escalation: Sudo misconfiguration leading to root

Defensive Insights:

  • MITRE ATT&CK mapping for detection engineering
  • Risk ratings and business impact assessment
  • Remediation guidance and compensating controls
  • Detection opportunities at each attack stage

๐Ÿ“– Read Full Case Study โ†’

๐ŸŽฏ Why Red Team Skills Matter for Blue Team Roles

My offensive security background directly strengthens defensive capabilities:

๐Ÿ”

Attack Detection

Understanding how attacks work enables creation of accurate detection rules and SIEM queries

๐Ÿ“Š

Threat Hunting

Knowledge of attacker TTPs informs proactive hunting hypotheses and investigation priorities

๐Ÿ›ก๏ธ

Incident Response

Experience with exploitation chains accelerates incident analysis and containment decisions

๐ŸŽ“

Security Training

Practical attack knowledge enables realistic tabletop exercises and security awareness training

Current Focus: Applying offensive security knowledge to SOC analyst workflows through LetsDefend investigations, TryHackMe blue team paths, and hands-on SIEM lab work. Seeking SOC L1/Security Operations roles in Melbourne where this perspective strengthens defensive capabilities.

๐Ÿ’ก Note on Active Boxes: Per HTB community guidelines, write-ups are only published after box retirement. Proof screenshots demonstrate completion without revealing solutions. Full methodologies and detailed write-ups are available for all retired boxes in my GitHub repository.

๐Ÿ“ฌ Discuss Offensive Security Techniques

Interested in discussing attack methodologies, defensive applications, or collaboration opportunities?

Get In Touch โ†’