💡 Ctrl + K to quickly focus search box

Administrator

1, Port scan ``` PORT STATE SERVICE VERSION 21/tcp open ftp Microsoft ftpd | ftp-syst: |_ SYST: Windows_NT 53/tcp open dom...

2025-08-02 06:01 18.8 KB 4 images HTB Medium

Backfire

1,Recon port scan ``` PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 9.2p1 Debian 2+deb12u4 (protocol 2.0) | ssh-hostkey: | ...

2025-08-02 06:01 21.5 KB 4 images HTB Medium

Blurry

The CVE exploitation of the footprint is relatively complex, and mainly requires reading the POC document. For root, its cleanup script runs too frequently, and it needs to be completed as soon as pos...

2025-08-02 06:01 17.0 KB 9 images HTB Medium

Cat

1,Recon port scan ``` PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.11 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: ...

2025-08-02 06:01 11.0 KB 2 images HTB Medium

Certified

Very typical AD machine, not too much, every step is very obvious.

2025-08-02 06:01 25.0 KB 4 images HTB Medium

Compiled

It mainly exploited the CVE-2024-32002 vulnerability of git to gain a foothold, then enumerated the gitea database to obtain the credentials of other users. Finally, it used CVE-2024-20656 to escalate...

2025-08-02 06:01 27.5 KB 12 images HTB Medium

Cypher

1,Recon port scan ``` PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 9.6p1 Ubuntu 3ubuntu13.8 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: ...

2025-08-02 06:01 5.7 KB 3 images HTB Medium

🔒 Environment

This machine, as its name suggests, is related to the environment.

2025-08-02 06:01 12.9 KB 12 images HTB Medium LOCKED

🔒 Era

For the footpath part, I think it is interesting that the ssh2exec exploit was hard to think of at first, but after code review, I could see this weakness. For the root part, the only coincidence is t...

2025-08-02 06:01 16.8 KB 20 images HTB Medium LOCKED

EvilCUPS

EvilCUPS is all about the recent CUPS exploits that have made a lot of news in September 2024.

2025-08-02 06:01 6.7 KB 7 images HTB Medium
Jump to