Binary Exploitation Knote (HackTheBox) Heya infosec folks, in this write-up we will cover the Knote (kernel-note) kernel-pwn challenge on HackTheBox. We can trigger a local privilege escalation attack by exploiting a use-after-free bug. The description of the challenge is as follows: Secure your secrets in the kernel space! Summary * What are kernel modules? * How
Binary Exploitation Superfast (HackTheBox) Hey folks. In this write-up, we're going to discuss the Superfast challenge in HackTheBox which was part of the HackTheBox Business CTF 2022. We're going to perform a single-byte overwrite to bypass ASLR, leak stack pointers, and perform a Return Oriented Programming (ROP) chain. The description of the challenge is:
Binary Exploitation Finale (HackTheBox) Hey all. Today we're going to discuss the retired Finale challenge on HackTheBox. The description on HackTheBox is as follows: It's the end of the season and we all know that the Spooktober Spirit will grant a souvenir to everyone and make their wish come true! Wish you the best
HackTheBox challenges WeakRSA (HackTheBox) G'day everyone! In this write-up we are going to solve the retired WeakRSA challenge on Hack The Box. In order to do so however it is important you understand some of the basics. You will learn * Basic RSA * Decoding pem formats How does RSA work? RSA is an encryption algorithm
HackTheBox challenges Blacksmith (HackTheBox) Hey all. Today we're going to discuss the retired Blacksmith challenge on HackTheBox. The description on HackTheBox is as follows: You are the only one who is capable of saving this town and bringing peace upon this land! You found a blacksmith who can create the most powerful weapon in