0xdf's Avatar

0xdf

@0xdf.bsky.social

Principal Training Architect @ HackTheBox CTF Addict "Potentially a legit researcher" he/him Website: https://0xdf.gitlab.io/ YouTube: https://www.youtube.com/c/0xdf0xdf Twitter: 0xdf_ Discord: 0xdf Mastadon: 0xdf@infosec.exchange

960 Followers  |  254 Following  |  307 Posts  |  Joined: 15.07.2023  |  2.1602

Latest posts by 0xdf.bsky.social on Bluesky

Preview
HTB: RustyKey RustyKey HTB walkthrough: Timeroasting to crack computer passwords, ForceChangePassword abuse, CLSID hijacking via registry, and RBCD for domain compromise.

RustyKey from HackTheBox is an assume breach AD box. I'll Timeroast to get a better foothold, and after some AD privilege chaining with BloodHound, perform a CLSID hijack, and then abuse AddAllowedToAct to RBCD to escalate to administrator.

08.11.2025 15:00 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Free AI HTB Tutor
Generative AI has many applications. An amazing one is to give it a writeup to a challenge you're trying to solve but stuck on and getting it to coach you th... Free AI HTB Tutor

If you're using writeups to learn how to hack on HackTheBox (or other CTFs), use AI as a tutor. In this video I'll show a free prompt to use, as well as a Claude Skill I developed.

05.11.2025 15:42 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
HTB: Dump Dump has a website that collects packets on a specific port. It can also handle PCAP uploads and download all the current PCAP files in a zip archive. Iโ€™ll abuse wildcard injection in the zip command with some carefully crafted filenames to get RCE and a shell. Iโ€™ll pivot to the next user with a password from the database. Iโ€™ll then abuse how www-data can run sudo to run tcpdump to get root.

Dump from VulnLab released on HackTheBox last week. It has some very trick injections and a sudo rule puzzle to work out - I'll show two ways.

04.11.2025 12:27 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Thank you! So glad to hear that.

I'm bummed bs never really took off (at least I get very little interaction). But glad to know at least some people get benefit. At this point posting to five different places is just built into the cicd of building the post, so it's low effort for me to continue ๐Ÿ˜

01.11.2025 15:59 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
HTB: Voleur Voleur is an active directory box that starts with assume breach credentials. Iโ€™ll find an Excel notebook with credentials and get a shell. Iโ€™ll find a deleted user and switch to a service account to recover it. That user can access an SMB share with a userโ€™s home directory backup, where Iโ€™ll find DPAPI encrypted credentials. Iโ€™ll recover those, getting access to an SSH key that provides access to a WSL instance. There Iโ€™ll find registry hive backups where I can dump the administrator hash.

Voleur is an assume breach active directory box from HackTheBox. It has lots of passwords, deleted user recovery, DPAPI, targeted kerberoasting, and hashes from registry hives.

01.11.2025 15:40 โ€” ๐Ÿ‘ 4    ๐Ÿ” 2    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
HTB: Store HTB Store walkthrough: exploiting XOR encryption for arbitrary file read, SFTP tunneling to Node.js debugger, and Chrome webdriver RCE for root access.

Store from VulnLab released on HackTheBox yesterday. It's got a web decryption known plaintext attack, directory traversal, node inspect, and Chrome debug.

30.10.2025 10:00 โ€” ๐Ÿ‘ 2    ๐Ÿ” 3    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
HTB: Artificial Artificial starts with an AI website where I can upload models that are run with TensorFlow. Iโ€™ll exploit a deserialization vulnerability in how TensorFlow handles h5 files to get RCE and a foothold. Iโ€™ll find hashes in the database and crack one to pivot to the next user. That user has access to an instance of Backrest running on localhost. Iโ€™ll find the config and crack the hash to get access, and then show three ways to get execution as root through the application.

Artificial from HackTheBox is starts with uploading a malicious TensorFlow model to get a foothold through deserialization. I'll abuse Backrest in three different ways for root.

25.10.2025 15:00 โ€” ๐Ÿ‘ 4    ๐Ÿ” 4    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
HTB: DarkCorp DarkCorp lives up to itโ€™s insane difficulty, with three hosts, including a Windows AD domain, and starts with a Debian web/mail server. Iโ€™ll exploit an XSS in RoundCube to get access to the adminโ€™s emails, leaking a private subdomain. Iโ€™ll reset the adminโ€™s password and get into the dashboard, identifying an SQLI. Iโ€™ll abuse PostgreSQL to get RCE from this two ways. In a PGP-encrypted backup Iโ€™ll find the hash for another user and crack it, getting auth to the domain. Those creds also get me into a website on the Windows web server that can do status checks on other websites. These checks will attempt NTLM authentication, and Iโ€™ll relay that to create a domain entry, and then use printer bug to get the WEB-01 box to authenticate to me, which I can relay to get a silver ticket for administrator on WEB-01. On that host Iโ€™ll find the local administrator account creds in the scheduled tasks, and use those to decrypt a stored credential. Password spraying that password will own another account on the domain. That user can get a shadow credential for another user. That user has a matching .adm account, and Iโ€™ll do UPN spoofing to get access to that admin account back on the original Linux host. With root access on that host, Iโ€™ll pull cached AD credentials from the SSSD database to pivot back to the DC. This user can modify a GPO, which Iโ€™ll abuse to get administrator access over the entire domain.

DarkCorp from HackTheBox lived up to it's insane rating. Pivots from Linux to Windows and back, abuse of cross-OS Kerberos, and lots more. Several new techniques in this one.

18.10.2025 15:50 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
HTB: TombWatcher TombWatcher is an assume breach active directory box. Iโ€™ll use BloodHound to find a path to another user with targeted Kerberoasting, GMSA, ForceChangePassword, and a shadow credential. This user has access to the AD Recycle Bin, where Iโ€™ll recover an old ADCS admin account. Iโ€™ll use that account to exploit ESC15 to get Administrator access.

TombWatcher from HackTheBox is an assume breach Windows AD box. BloodHound shows a path abusing targeted Kerberoasting, GMSA, password change, and shadow creds. Then there's AD Recycle Bin and ESC15.

11.10.2025 15:00 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
HTB: Watcher Watcher starts with a Zabbix server. Iโ€™ll abuse CVE-2024-22120, a blind SQL injection to leak the admin session and get RCE. From there Iโ€™ll log in as admin and find a user logging in every minute. Iโ€™ll update the login PHP source to save the creds to a file. Those creds also work for a local instance of TeamCity, which I can log into as an admin and abuse a build pipeline to get execution as root.

Watcher from VulnLab released on HackTheBox last week. It's a web-centric box with Zabbix exploitation, and then changing the source code to capture logins. I'll escalate though TeamCity.

09.10.2025 09:58 โ€” ๐Ÿ‘ 1    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Uncheesable [0xff: One Last Address]
The HTB Content team made me a goodbye CTF consisting of four challenges. In this video, I'll solve Uncheesable, a forensics challenge involving a memory dum... Uncheesable [0xff: One Last Address]

Uncheesable is the final challenge from the CTF the HackTheBox content team made for me as a goodbye present. I'll get a memory dump from a custom Linux kernel. I'll pull the bzImage from the dump, generate the symbols, and use vol3 to find the flag.

06.10.2025 11:01 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
HTB: Certificate Certificate starts with a school website that accepts assignment uploads in limited formats that includes zip archives. Iโ€™ll show two ways to bypass the filters in PHP and upload a webshell - first with a null byte in the filename inside the zip, and then by stacking two zips together. Both of these abuse how the filesystem and PHP handle these cases differently. Iโ€™ll pivot to the next user after dumping a hash from the website DB. That user has access to a PCAP, where Iโ€™ll find a Kerberos authentication and crack it in hashcat to get the next user. Iโ€™ll exploit ESC in the ADCS environment to get the next user, and then use their membership in the Domain Storage Managers group (which gives SeManageVolumePrivilege) to get arbitrary file read on the system. The root flag is encrypted with EFS, so Iโ€™ll exfil the ADCS private key and use a Golden Certificate attack to get a shell as the Administrator user and the final flag.

Certificate from HackTheBox is a hard box with a bit of everything. There's upload / zip shenanigans (two ways), PCAP analysis and Kerberos cracking, ASCS ESC3, and Golden Certificate.

04.10.2025 18:02 โ€” ๐Ÿ‘ 3    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Antipattern [0xff: One Last Address]
The HTB Content team made me a goodbye CTF consisting of four challenges. In this video, I'll solve Antipattern, a fullpwn machine that replicates my website... Antipattern [0xff: One Last Address]

Antipattern is the third video from the personal CTF the HackTheBox content team made me a as goodbye present. It's a full pwn box with my website, lots of memes, and, lots of things I always complained about when reviewing community submissions.

03.10.2025 10:29 โ€” ๐Ÿ‘ 4    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
0o337 [0xff: One Last Address]
The HTB Content team made me a goodbye CTF consisting of four challenges. In this video, I'll solve 0o337, a forensics challenge digging through a PCAP file ... 0o337 [0xff: One Last Address]

The HackTheBox content team made me a personal CTF as as goodbye present. In this second video, I'll show 0o337, an easy forensics challenge with a PCAP and a nice (even if unrealistic) maze to follow. Still some nice tricks to showcase.

01.10.2025 15:06 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Farewell [0xff: One Last Address]
The HTB Content team made me a goodbye CTF consisting of four challenges. In this video, I'll solve Farewell, a format string pwn challenge from w3th4nds.w3t... Farewell [0xff: One Last Address]

The HackTheBox content team made me a personal CTF as as goodbye present. In this video, I'll show Farewall, a pwn challenge with a simple format string vulnerability, a few hurdles to work around, and some neat pwntools tricks at the end.

29.09.2025 10:21 โ€” ๐Ÿ‘ 7    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
HTB: Puppy Puppy is a Windows Active Directory pentest simulation. It starts with a set of creds in the HR group, which a common target of phishing attacks. That user has GenericWrite over the Developers group, so Iโ€™ll add my user and get access to SMB shares where Iโ€™ll find a KeePassXC database. Iโ€™ll crack the secret with John, and get auth as the next user. That uses is a member of Senior Devs, which has GenericAll over another user. Iโ€™ll reset that userโ€™s password and get a WinRM session. This user has access to a site backup, where Iโ€™ll find a password to spray and get WinRM as the next user. Finally, Iโ€™ll abuse that userโ€™s DPAPI access to get a saved credential for an administrator.

Puppy is a nice AD assume breach box. I'll abuse GenericWrite on a group, GenericAll on a user, bruteforce a KeepassXC DB, find creds in a config, and dump DPAPI stored credentials.

27.09.2025 15:00 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
HTB: BabyTwo Another Windows box where Iโ€™ll try username as password and find two accounts. From those Iโ€™ll get access to the SYSVOL share, where I can poison a logon script to give me a reverse shell when the user logs in. That user has control over another service account that is meant to administer GPOs. Iโ€™ll abuse the GPO to get shell in the administratorโ€™s group.

BabyTwo from VulnLab released on HackTheBox on Thursday. It has GPO abuse and logon script poisoning.

26.09.2025 15:10 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
HTB: Fluffy Fluffy is an assume-breach Windows Active Directory challenge. Iโ€™ll start by exploiting CVE-2025-24071 / CVE-2025-24055, a vulnerability in how Windows handles library-ms files in zip archives, leading to authentication attempts to the attacker. Iโ€™ll get a NetNTLMv2 and crack it. From there, BloodHound data shows that this user has GenericWrite over some service accounts. Iโ€™ll abuse that to get a WinRM shell with one. From this user, Iโ€™ll exploit ESC16 in the ADCS environment to get a shell as Administrator.

Fluffy from HackTheBox is a nice AD / ADCS box with CVE-2025-24071/CVE-2025-24054 to get a NetNTLMv2, and then pivot using BloodHound to get access to a user who can exploit ESC16 in the ADCS environment.

20.09.2025 15:00 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

My new favorite CTF tip!

If youโ€™re stuck on a box, find a writeup and feed the solution to an llm. Use the instructions of โ€œDo not tell me the answer under any circumstances, but guide me as I ask questions.โ€

Youโ€™ll think critically and make progress without feeling like you cheated.

#CTF #GenAI

19.09.2025 01:26 โ€” ๐Ÿ‘ 7    ๐Ÿ” 3    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 0
Preview
HTB: Baby Baby is an easy Windows Active Directory box. Iโ€™ll start by enumerating LDAP to find a default credential, and spray it to find another account it works on. From there, Iโ€™ll abuse Backup Operators / SeBackupPrivilege to get dump both the local and domain hashes, finding a hash for the Administrator account that works to get a shell.

Baby is the second VulnLab box to release on HackTheBox this week. It's an easy Windows AD box with LDAP enumeration, password spraying, and SeBackupPrivilege. I'll do the LDAP enumeration completely from netexec.

19.09.2025 12:08 โ€” ๐Ÿ‘ 2    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
HTB: Forgotten Forgotten starts with an uninitialized instance of LimeSurvey. Iโ€™ll do the installation wizard, using a MySQL instance hosted on my VM as the database, and giving myself superadmin access. Iโ€™ll upload a malicious plugin to get RCE and a shell in the LimeSurvey container. Iโ€™ll find a password in an environment variable that works for the user account on the host, as well as sudo to get root in the container. Iโ€™ll abuse that to write a root-owned SetUID binary in a shared folder on the container such that I get access to it on the host and complete the compromise.

Forgotten from VulnLab released on HackTheBox today. It's a nice easy box with LimeSurvey, shared credentials, and a nice Docker abuse to get root.

17.09.2025 02:23 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
HTB: Planning Planning offers a Grafana instance thatโ€™s vulnerable to a CVE in DuckDB that is an SQL injection that can lead to remote code execution. Iโ€™ll abuse that to get a shell as root in the Grafana container. Iโ€™ll find creds in an environment variable, and use them to pivot to the host over SSH. There Iโ€™ll find an instance of Crontab UI. Iโ€™ll get creds from a backup cron, and use it to make my own cron as root to get execution. In Beyond Root Iโ€™ll dig into the Grafana Swagger UI and the Crontab UI configuration.

Planning from HackTheBox is a nice easy box with Grafana exploitation, creds in environment variables and scripts, and Crontab UI.

13.09.2025 15:00 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
HTB: Delegate Delegate starts with a bat script on an open SMB share that leaks credentials. Iโ€™ll use those to targeted Kerberoast another user, and get a shell. That user has SeChangeNotifyPrivilege, which Iโ€™ll use to give a fake computer unconstrained delegation, and then capture the DC machine account TGT. From there I can DCSync to dump the Administratorโ€™s NTLM hash.

Delegate from VulnLab releases yesterday on HackTheBox. There's targeted Kerberoasting and more delegation attacks, similar to Redelegate that released last month.

12.09.2025 15:58 โ€” ๐Ÿ‘ 3    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

Yeah, I've been playing with the ghidra mcp. It's really nice

06.09.2025 15:14 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
HTB: Environment Environment starts with a Laravel website that happens to be running in debug mode. Iโ€™ll abuse a CVE that allows me to set the environment via the URL. Iโ€™ll find in the debug crashes that if the environment is set to โ€œpreprodโ€, the login page is bypassed, and use that to get access to the internal site. There Iโ€™ll abuse another CVE to bypass file filtering in the Laravel filemanager to upload a webshell. Iโ€™ll find a GPG-encrypted file and the private key to get access to the next user. Finally, Iโ€™ll abuse a sudo rule that allows keeping the BASH_ENV environment variable to get root.

Environment from HackTheBox is all about exploiting Laravel and a couple CVEs in it. There's also some BASH_ENV thrown in for root.

06.09.2025 15:00 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
HTB: Media Media starts with a PHP site on Windows that takes video uploads. Iโ€™ll use a wax file to leak a net-NTLMv2 hash, and then crack it to get SSH access to the host. Iโ€™ll understand how the webserver is writing the files to the filesystem, and use a junction point link to have it write into the web root, allowing me to upload a webshell and get access as local service. Iโ€™ll use FullPowers to enable the SeImpersonatePrivilage, and then GodPotato to get System.

The second vulnlab release on HackTheBox this week is Media. There's an interesting NTLM capture, followed by a pivot back to the local service account to get SeImpersonate.

04.09.2025 22:35 โ€” ๐Ÿ‘ 3    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
HTB: Race Race starts with a website on Grav CMS, and a phpSysInfo page. Iโ€™ll find creds in the process list on phpSysInfo to get into the Grav admin panel as the limited backup user. Iโ€™ll create a backup, and use the results to reset the password of another admin. From this admin, Iโ€™ll show two ways to get execution, using CVE-2024-28116 and a malicious theme. From there Iโ€™ll pivot to the next user with a password from a shell script. For root, Iโ€™ll abuse a time-of-check / time-of-use vulnerability in a cron script, using named pipes to hang execution allowing me to switch files.

Race is a neat VulnLab box now on HackTheBox involving Grav CMS, phpSysInfo, and a very fun time of check / time of use vulnerability.

02.09.2025 19:22 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Yeah, I am going to have to really learn the AI side of things, but it's an exciting challenge. I don't think I've fully wrapped my head around all the potential yet :)

01.09.2025 14:38 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
HTB: Eureka Eureka starts with a Spring Boot website. Iโ€™ll abuse an exposed heapdump endpoint to get creds from memory and SSH access. From there Iโ€™ll poison the Spring Cloud Gateway configuration to capture login credentials for another user. To get root, Iโ€™ll abuse a Bash arithmetic injection to get execution in a script analyzing logs on a cron.

Eureka from HackTheBox showcases exploiting Spring Boot and the heapdump endpoint, Spring Cloud Gateway, and some Bash arithmetic operations.

30.08.2025 15:00 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Practically speaking, I still plan to continue posting my writeups for HTB retiring machines (time permitting)โ€”though I will fall behind on VulnLab (three posts a week is a lot). I'm hoping to still make YouTube videos, and may even drop in on Cube Talks from time to time. 6/6

28.08.2025 18:49 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

@0xdf is following 19 prominent accounts