Skip to primary content
Skip to secondary content

InfoSec Dutchie

Information Security with a Dutch twist

InfoSec Dutchie

Main menu

  • Home
  • About Me
  • Contact

Tag Archives: ctf

Post navigation

← Older posts

Hack the Box Writeup: Driver (10.10.11.106)

Posted on 26/06/2022 by d0p4m1n3
Reply

Driver is an Easy box from Hack the Box. The name gives you a very good idea of what you will encounter, but it’s still a fun box to do. It is an easy one, but the vulnerability is one that a lot of sysadmins know as “working late”.

Continue reading →
Posted in Writeups | Tagged ctf, hack the box, writeup | Leave a reply

Hack The Box Writeup: Omni (10.10.10.204)

Posted on 16/02/2021 by d0p4m1n3
Reply

The box Omni had a very unusual Operating System for HTB machines. It was a Windows 10 IoT machine, which was new for me. The foothold consisted of an exploit for this Operating System. For user and root, I used the same technique and grabbed reverse shells.

Continue reading →
Posted in Writeups | Tagged ctf, hack the box, writeup | Leave a reply

Hack The Box Writeup: Time

Posted on 16/02/2021 by d0p4m1n3
Reply

I was over a month ago, since I last did a box on Hack The Box. So I choose one from the to-do list and that was Time. I have to say the box did not really satify me, but I did learn some new tricks on this medium Linux box.

Continue reading →
Posted in Writeups | Tagged ctf, hack the box, writeup | Leave a reply

Hack The Box Writeup: OpenKeyS

Posted on 18/12/2020 by d0p4m1n3
Reply

This box is the first OpenBSD machine I have done on Hack The Box. As the name already tells, it has something to do with OpenSSH keys. The foothold was very interesting, root a bit easy for a medium box. Nevertheless, a great box.

Continue reading →
Posted in Writeups | Tagged ctf, hack the box, writeup | Leave a reply

Hack The Box Writeup: Compromised (10.10.10.207)

Posted on 06/12/2020 by d0p4m1n3
Reply

This box really was compromised. Using some forensic skills you had to exploit the box using things the attacks left behind. In the end, there was some reverse engineering before the root flag could be grabbed. Truly a fun box to root.

Continue reading →
Posted in Writeups | Tagged ctf, hack the box, writeup | Leave a reply

Hack The Box Writeup: Laboratory (10.10.10.216)

Posted on 23/11/2020 by d0p4m1n3
Reply

This box has to be the toughest one I have done until now. Easy box? Hell no! With a current rating of 4.5, it is higher than most of the Medium level boxes. I started this one off with my brother in arms T13nn3s during a pizza and hack evening at work. Be sure to check out his blog.

Continue reading →
Posted in Writeups | Tagged ctf, hack the box, writeup | Leave a reply

Hack The Box Writeup: Buff (10.10.10.198)

Posted on 21/11/2020 by d0p4m1n3
Reply

The first thing that might come into your mind when seeing the machine name, is a Buffer Overflow. If that is the case, you just guessed the procedure to obtain root on this machine. Using an exploit to gain a webshell on this Windows Server is the startingpoint of running the CloudMe Buffer Overflow attack for root.

Continue reading →
Posted in Writeups | Tagged ctf, hack the box, writeup | Leave a reply

Hack The Box Writeup: Fuse

Posted on 15/11/2020 by d0p4m1n3
Reply

Fuse was a box that felt realistic to me since printer software often is a nice way into the company. Using the content and log information on the Papercut website to make a custom wordlist and grab root by exploiting the CAPCOM vulnerability.

Continue reading →
Posted in Writeups | Tagged ctf, hack the box, writeup | Leave a reply

Hack The Box Writeup: Tabby

Posted on 07/11/2020 by d0p4m1n3
Reply

Exploiting Tomcat, extraction a password from a zipped backup, and privilege escalation based on LXD/LXC on Linux. That is what Tabby was all about. An Easy Linux box with good learning curve.

Continue reading →
Posted in Writeups | Tagged ctf, hack the box, writeup | Leave a reply

Hack The Box Writeup: Cache

Posted on 01/11/2020 by d0p4m1n3
Reply

I have to say I really enjoyed this machine. Cache starts with finding soms credentials, exploiting the OpenEMR webapplication and getting root by using a Docker GTFOBin. Cache really is a good educational box.

Continue reading →
Posted in Writeups | Tagged ctf, hack the box, writeup | Leave a reply

Post navigation

← Older posts

Archives

  • June 2022
  • March 2021
  • February 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020

Meta

  • Log in
Proudly powered by WordPress
Exit mobile version