Location via proxy:   
[Report a bug]   [Manage cookies]                
Intigriti Writeup - hackdonalds challenge
· β˜• 1 min read · πŸ‘¨β€πŸ’» g4nd1v
Detailed walkthrough of the hackdonalds challenge on Intigriti platform, covering initial enumeration, exploiting vulnerabilities, and obtaining user and root flags.

MetaCTF 2025 CTF
· β˜• 2 min read · πŸ‘¨β€πŸ’» g4nd1v
This blog will contain all the writeups for MetaCTF 2025

Portswigger XSS Writeups
· β˜• 13 min read · πŸ‘¨β€πŸ’» g4nd1v
This blog will contain all the writeups for XSS Labs from Portswigger

Portswigger SQL Injection Writeups
· β˜• 14 min read · πŸ‘¨β€πŸ’» g4nd1v
This blog will contain all the writeups for SQL Injection Labs from Portswigger

HackTheBox Writeup - Busqueda Room
· β˜• 7 min read · πŸ‘¨β€πŸ’» g4nd1v
Busqueda is an Easy Difficulty Linux machine that involves exploiting a command injection vulnerability present in a `Python` module. By leveraging this vulnerability, we gain user-level access to the machine. To escalate privileges to `root`, we discover credentials within a `Git` config file, allowing us to log into a local `Gitea` service. Additionally, we uncover that a system checkup script can be executed with `root` privileges by a specific user. By utilizing this script, we enumerate `Docker` containers that reveal credentials for the `administrator` user and `Gitea` account. Further analysis of the system checkup script and source code in a `Git` repository reveals a means to exploit a relative path reference, granting us Remote Code Execution (RCE) with `root` privileges.

TryHackMe Writeup - The Lay of the Land
· β˜• 9 min read · πŸ‘¨β€πŸ’» g4nd1v
Learn about and get hands-on with common technologies and security products used in corporate environments; both host and network-based security solutions are covered.

HackTheBox Writeup - IClean Room
· β˜• 5 min read · πŸ‘¨β€πŸ’» g4nd1v
IClean is a medium-difficulty Linux machine featuring a website for a cleaning services company. The website contains a form where users can request a quote, which is found to be vulnerable to Cross-Site Scripting (XSS). This vulnerability is exploited to steal an admin cookie, which is then used to access the administrator dashboard. The page is vulnerable to Server-Side Template Injection (SSTI), allowing us to obtain a reverse shell on the box. Enumeration reveals database credentials, which are leveraged to gain access to the database, leading to the discovery of a user hash. Cracking this hash provides `SSH` access to the machine. The user’s mail mentions working with PDFs. By examining the `sudo` configuration, it is found that the user can run `qpdf` as `root`. This is leveraged to attach the `root` private key to a PDF, which is then used to gain privileged access to the machine.

HackTheBox Writeup - Office Room
· β˜• 8 min read · πŸ‘¨β€πŸ’» g4nd1v
Office is a hard-difficulty Windows machine featuring various vulnerabilities including Joomla web application abuse, PCAP analysis to identify Kerberos credentials, abusing LibreOffice macros after disabling the `MacroSecurityLevel` registry value, abusing MSKRP to dump DPAPI credentials and abusing Group Policies due to excessive Active Directory privileges.

HackTheBox Writeup - Crafty Room
· β˜• 3 min read · πŸ‘¨β€πŸ’» g4nd1v
Detailed walkthrough of the Crafty room on HackTheBox platform, covering initial enumeration, exploiting vulnerabilities, and obtaining user and root flags.

TryHackMe Writeup - CyberLens Room
· β˜• 4 min read · πŸ‘¨β€πŸ’» g4nd1v
Detailed walkthrough of the mKingdom room on TryHackMe platform, covering initial enumeration, exploiting vulnerabilities, and obtaining user and root flags.

HackTheBox Writeup - Monitored Box
· β˜• 6 min read · πŸ‘¨β€πŸ’» g4nd1v
Detailed walkthrough of the Monitored box on HackTheBox platform, covering initial enumeration, exploiting vulnerabilities, and obtaining user and root flags.

HackTheBox Writeup - Builder Room
· β˜• 5 min read · πŸ‘¨β€πŸ’» g4nd1v
Detailed walkthrough of the Builder box on HackTheBox platform, covering initial enumeration with LFI, exploiting vulnerabilities, and obtaining user and root flags.