CTF Platforms Writeups

Assess. Exploit.
Report.

Breaking boxes, popping shells, and documenting every step. Writeups for HackTheBox, TryHackMe, and CTF competitions.

Devarea — Medium facts — Easy gavel — Medium Fries — Hard Nanocorp — HARD Eighteen — HARD MonitorsFour — Easy Giveback — Easy TryHackMe: Sequence — ? TryHackMe: Voyage — ? TryHackMe: Extract — ? TryHackMe: Contrabando — ? TryHackMe: Soupedecode 01 — ? TryHackMe: Ledger — ? TryHackMe: Moebius — ? TryHackMe: Robots — ? TryHackMe: Billing — ? TryHackMe: Crypto Failures — ? TryHackMe: Rabbit Store — ? TryHackMe: Decryptify — ? TryHackMe: You Got Mail — ? TryHackMe: TryPwnMe Two — ? TryHackMe: Smol — ? TryHackMe: Lo-Fi — ? TryHackMe: Light — ? TryHackMe: Silver Platter — ? TryHackMe: AoC 2024 Side Quest Two — ? TryHackMe: AoC 2024 Side Quest Three — ? TryHackMe: AoC 2024 Side Quest One — ? TryHackMe: AoC 2024 Side Quest Four — ? TryHackMe: AoC 2024 Side Quest Five — ? TryHackMe: The Sticker Shop — ? TryHackMe: Lookup — ? TryHackMe: Mouse Trap — ? TryHackMe: Hack Back — ? TryHackMe: SeeTwo — ? TryHackMe: Whiterose — ? TryHackMe: Rabbit Hole — ? TryHackMe: Mountaineer — ? TryHackMe: Extracted — ? TryHackMe: Backtrack — ? TryHackMe: Brains — ? TryHackMe: Pyrat — ? TryHackMe: K2 — ? TryHackMe: The London Bridge — ? TryHackMe: Cheese CTF — ? TryHackMe: Breakme — ? TryHackMe: CERTain Doom — ? TryHackMe: TryPwnMe One — ? TryHackMe: Hammer — ? TryHackMe: U.A. High School — ? TryHackMe: Block — ? TryHackMe: Injectics — ? TryHackMe: DX2: Hell's Kitchen — ? TryHackMe: New York Flankees — ? TryHackMe: NanoCherryCTF — ? TryHackMe: Publisher — ? TryHackMe: W1seGuy — ? TryHackMe: mKingdom — ? TryHackMe: Airplane — ? TryHackMe: Include — ? TryHackMe: CyberLens — ? TryHackMe: Whats Your Name? — ? TryHackMe: TriCipher Summit — ? TryHackMe: Burg3r Bytes — ? TryHackMe: Creative — ? TryHackMe: Bypass — ? TryHackMe: Clocky — ? TryHackMe: El Bandito — ? TryHackMe: Hack Smarter Security — ? TryHackMe: Chrome — ? TryHackMe: Exfilibur — ? TryHackMe: Breaking RSA — ? TryHackMe: Kitty — ? TryHackMe: Reset — ? TryHackMe: Umbrella — ? TryHackMe: WhyHackMe — ? TryHackMe: Dodge — ? Devarea — Medium facts — Easy gavel — Medium Fries — Hard Nanocorp — HARD Eighteen — HARD MonitorsFour — Easy Giveback — Easy TryHackMe: Sequence — ? TryHackMe: Voyage — ? TryHackMe: Extract — ? TryHackMe: Contrabando — ? TryHackMe: Soupedecode 01 — ? TryHackMe: Ledger — ? TryHackMe: Moebius — ? TryHackMe: Robots — ? TryHackMe: Billing — ? TryHackMe: Crypto Failures — ? TryHackMe: Rabbit Store — ? TryHackMe: Decryptify — ? TryHackMe: You Got Mail — ? TryHackMe: TryPwnMe Two — ? TryHackMe: Smol — ? TryHackMe: Lo-Fi — ? TryHackMe: Light — ? TryHackMe: Silver Platter — ? TryHackMe: AoC 2024 Side Quest Two — ? TryHackMe: AoC 2024 Side Quest Three — ? TryHackMe: AoC 2024 Side Quest One — ? TryHackMe: AoC 2024 Side Quest Four — ? TryHackMe: AoC 2024 Side Quest Five — ? TryHackMe: The Sticker Shop — ? TryHackMe: Lookup — ? TryHackMe: Mouse Trap — ? TryHackMe: Hack Back — ? TryHackMe: SeeTwo — ? TryHackMe: Whiterose — ? TryHackMe: Rabbit Hole — ? TryHackMe: Mountaineer — ? TryHackMe: Extracted — ? TryHackMe: Backtrack — ? TryHackMe: Brains — ? TryHackMe: Pyrat — ? TryHackMe: K2 — ? TryHackMe: The London Bridge — ? TryHackMe: Cheese CTF — ? TryHackMe: Breakme — ? TryHackMe: CERTain Doom — ? TryHackMe: TryPwnMe One — ? TryHackMe: Hammer — ? TryHackMe: U.A. High School — ? TryHackMe: Block — ? TryHackMe: Injectics — ? TryHackMe: DX2: Hell's Kitchen — ? TryHackMe: New York Flankees — ? TryHackMe: NanoCherryCTF — ? TryHackMe: Publisher — ? TryHackMe: W1seGuy — ? TryHackMe: mKingdom — ? TryHackMe: Airplane — ? TryHackMe: Include — ? TryHackMe: CyberLens — ? TryHackMe: Whats Your Name? — ? TryHackMe: TriCipher Summit — ? TryHackMe: Burg3r Bytes — ? TryHackMe: Creative — ? TryHackMe: Bypass — ? TryHackMe: Clocky — ? TryHackMe: El Bandito — ? TryHackMe: Hack Smarter Security — ? TryHackMe: Chrome — ? TryHackMe: Exfilibur — ? TryHackMe: Breaking RSA — ? TryHackMe: Kitty — ? TryHackMe: Reset — ? TryHackMe: Umbrella — ? TryHackMe: WhyHackMe — ? TryHackMe: Dodge — ?
78
Writeups
8
Categories
Featured Writeups View all →
// HACKTHEBOX · 2026
Devarea

DevArea is a Linux machine hosting multiple vulnerable services. Initial access is gained through anonymous FTP revealing a JAR file vulnerable to Apache CXF SSRF (CVE-2022-46364), which exposes Hoverfly credentials in systemd service files. The Hoverfly instance is vulnerable to path traversal (CVE-2025-54123), leading to remote code execution. Privilege escalation exploits a world-writable `/bin/bash` binary combined with a passwordless sudo rule, allowing arbitrary command execution as root.

HACKTHEBOX MEDIUM
// HACKTHEBOX · 2026
facts

Facts is a medium-difficulty machine that revolves around exploiting a vulnerable CMS hosted on facts.htb. Initial enumeration reveals multiple exposed services, including a web application and SSH. The key to gaining access lies in a path traversal vulnerability within the CMS, allowing authenticated users to download sensitive files. By leveraging this flaw, we can retrieve the SSH private key for the 'trivia' user, crack it, and gain initial access. From there, we can escalate privileges using a misconfigured sudo permission on the 'facter' command.

HACKTHEBOX EASY
// LINUX · 2025
gavel

Gavel is a medium-difficulty Linux machine that demonstrates the exploitation of a misused SQL PDO statement to achieve SQL injection and extract data from an internal database. The scenario further highlights a PHP code-injection flaw that is exploited to execute remote commands, thereby enabling initial access to the target. Privilege escalation is achieved by targeting a root-owned daemon that processes user-supplied YAML files; by submitting a crafted YAML payload, PHP code is executed within a sandboxed environment with root privileges.

HACKTHEBOX MEDIUM
// ACTIVE DIRECTORY · 2025
Fries

Fries is a hard Active Directory machine on Hack The Box. It involves various techniques such as LDAP enumeration, Kerberos attacks, and SMB exploitation to gain access to the system and escalate privileges to root.

HACKTHEBOX HARD
// ACTIVE DIRECTORY · 2025
Nanocorp

Nanocorp is a Hard difficulty Active Directory machine that exploits CVE-2025-24054 to extract NTLM hashes via malicious .library-ms files. After gaining initial access and password cracking, privilege escalation is achieved through a Check MK Agent vulnerability by crafting a malicious MSI repair payload to execute code as SYSTEM.

HACKTHEBOX HARD