💡 Ctrl + K to quickly focus search box

🔒 Cobblestone

Regarding the foothold, our team discovered an XSS vulnerability and an unused user named "John." Perhaps SQL injection isn't the intended exploit? After all, this is an insane machine, so simply usin...

2025-08-12 04:01 17.5 KB 13 images HTB Insane LOCKED

🔒 Editor

Very easy linux machine in this period.

2025-08-03 03:38 12.3 KB 4 images HTB Easy LOCKED

Administrator

1, Port scan ``` PORT STATE SERVICE VERSION 21/tcp open ftp Microsoft ftpd | ftp-syst: |_ SYST: Windows_NT 53/tcp open dom...

2025-08-02 06:01 18.8 KB 4 images HTB Medium

Backfire

1,Recon port scan ``` PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 9.2p1 Debian 2+deb12u4 (protocol 2.0) | ssh-hostkey: | ...

2025-08-02 06:01 21.5 KB 4 images HTB Medium

Blurry

The CVE exploitation of the footprint is relatively complex, and mainly requires reading the POC document. For root, its cleanup script runs too frequently, and it needs to be completed as soon as pos...

2025-08-02 06:01 17.0 KB 9 images HTB Medium

Cat

1,Recon port scan ``` PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.11 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: ...

2025-08-02 06:01 11.0 KB 2 images HTB Medium

Certified

Very typical AD machine, not too much, every step is very obvious.

2025-08-02 06:01 25.0 KB 4 images HTB Medium

Compiled

It mainly exploited the CVE-2024-32002 vulnerability of git to gain a foothold, then enumerated the gitea database to obtain the credentials of other users. Finally, it used CVE-2024-20656 to escalate...

2025-08-02 06:01 27.5 KB 12 images HTB Medium

Cypher

1,Recon port scan ``` PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 9.6p1 Ubuntu 3ubuntu13.8 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: ...

2025-08-02 06:01 5.7 KB 3 images HTB Medium

🔒 Environment

This machine, as its name suggests, is related to the environment.

2025-08-02 06:01 12.9 KB 12 images HTB Medium LOCKED
Jump to