protocols
Hackthebox - Silo
ยท โ˜• 22 min read ยท ๐Ÿ‘ค Hong
Silo focuses mainly on leveraging Oracle to obtain a shell and escalate privileges. It was intended to be completed manually using various tools, however Oracle Database Attack Tool greatly simplifies the process, reducing the difficulty of the machine substantially.

Hackthebox - Devel
ยท โ˜• 9 min read ยท ๐Ÿ‘ค Hong
Devel, while relatively simple, demonstrates the security risks associated with some default program configurations. It is a beginner-level machine which can be completed using publicly available exploits.

Hackthebox - Blue
ยท โ˜• 5 min read ยท ๐Ÿ‘ค Hong
Blue, while possibly the most simple machine on Hack The Box, demonstrates the severity of the EternalBlue exploit, which has been used in multiple large-scale ransomware and crypto-mining attacks since it was leaked publicly.

Hackthebox - Legacy
ยท โ˜• 2 min read ยท ๐Ÿ‘ค Hong
Legacy is a fairly straightforward beginner-level machine which demonstrates the potential security risks of SMB on Windows. Only one publicly available exploit is required to obtain administrator access.

Hackthebox - Friendzone
ยท โ˜• 12 min read ยท ๐Ÿ‘ค Hong
FriendZone is an easy difficulty Linux box which needs fair amount enumeration. By doing a zone transfer vhosts are discovered. There are open shares on samba which provides credentials for an admin panel. From there, an LFI is found which is leveraged to get RCE. A cron is found running which uses a writable module, making it vulnerable to hijacking.

Hackthebox - Sunday
ยท โ˜• 16 min read ยท ๐Ÿ‘ค Hong
Sunday is a fairly simple machine, however it uses fairly old software and can be a bit unpredictable at times. It mainly focuses on exploiting the Finger service as well as the use of weak credentials.