Interpreter
In general, all the vulnerabilities are very clear and easy to find.
Comprehensive writeups for HackTheBox machines across Easy, Medium, Hard, and Insane difficulties
Total 187 reports , currently page 2 of 19 (10 per page)
In general, all the vulnerabilities are very clear and easy to find.
The privilege escalation section's use of CVE-2025-4517 is a classic example and is well-suited for teaching and demonstration.
``` ┌──(wither㉿localhost)-[~/Templates/htb-labs/Medium/Pterodactyl] └─$ nmap -sC -sV -Pn 10.129.187.198 -oN ./nmap.txt Starting Nmap 7.98 ( https://nm...
Even on a very simple Linux machine, it's still possible to clearly find all the vulnerable versions. The final privilege escalation is also crystal clear.
Overall, it's a very simple machine. All vulnerabilities can be identified by checking the version number, and even privilege escalation can be automated using Metaspoilt.
Overall, it provides a very complete vulnerability environment for common vulnerabilities in the Active Directory domain, covering Pre-Windows 2000 compatibility access vulnerabilities, RBCD component...
Overall, it's a very interesting Docker escape machine, and its exploitation of the web portion is one of the latest CVEs.
``` ┌──(wither㉿localhost)-[~/Templates/htb-labs/Hard/Fries] └─$ nmap -sC -sV -Pn 10.129.235.12 -oN ./nmap.txt Starting Nmap 7.95 ( https://nmap.org )...
Overall, it's a very clunky Active Directory machine, especially in its use of web applications. Using the admin account's password as the universal password is incredibly uninspired.
Bruno is a moderately difficult Windows domain machine. The attack chain begins with an insecure ZIP decompression of the service, resulting in a zip-slip that writes a malicious DLL to C:\samples\app...