Skip to content

Offensive Security Writeups (NO LONGER MAINTAINED)

Hack The Box is an online platform allowing you to test your penetration testing skills and exchange ideas and methodologies with thousands of people in the security field.

Below you will find my personal writeups of the various boxes that can be found on hackthebox.eu, ranked by difficulty.

Hack The Box - Easy Boxes

Template Page

  1. ✅ - Lame
  2. ✅ - Legacy
  3. ✅ - Devel
  4. ✅ - Beep
  5. ✅ - Optimum
  6. ✅ - Arctic
  7. ✅ - Grandpa
  8. ✅ - Granny
  9. ✅ - Bank
  10. ✅ - Blocky
  11. ✅ - Blue
  12. ✅ - Mirai
  13. ✅ - Shocker
  14. ✅ - Sense
  15. ✅ - Bashed
  16. ✅ - Nibbles
  17. ✅ - Valentine
  18. ✅ - Sunday
  19. ✅ - Bounty
  20. ✅ - Jerry
  21. ✅ - Active
  22. ✅ - Access
  23. ✅ - Frolic
  24. ✅ - Curling
  25. ✅ - Irked
  26. ✅ - Teacher
  27. ✅ - Help
  28. ✅ - FriendZone
  29. ✅ - Netmon
  30. ✅ - CasaDePapel
  31. ✅ - Bastion
  32. ✅ - SwagShop
  33. ✅ - Writeup
  34. ✅ - Haystack
  35. ✅ - Safe
  36. ✅ - Heist
  37. ✅ - Networked
  38. ✅ - Forest
  39. ✅ - Postman
  40. ✅ - Traverxec
  41. ✅ - OpenAdmin
  42. ✅ - Nest
  43. ✅ - Traceback
  44. ✅ - Remote
  45. ✅ - Servmon
  46. ✅ - Admirer
  47. ✅ - Blunder
  48. ✅ - Tabby
  49. ✅ - Buff
  50. ✅ - Omni
  51. ✅ - Doctor
  52. ✅ - Academy
  53. ✅ - Laboratory
  54. ✅ - Luanne
  55. ✅ - Delivery
  56. ✅ - Toolbox
  57. ✅ - Sauna
  58. ✅ - ScriptKiddie
  59. ✅ - Armageddon
  60. ✅ - Spectra
  61. ✅ - Love
  62. ✅ - Cap
  63. ✅ - Knife
  64. ✅ - Previse
  65. ✅ - Paper
  66. ✅ - BountyHunter
  67. ✅ - Explore
  68. ✅ - Horizontall
  69. ✅ - Backdoor
  70. ✅ - Driver

Hack The Box - Medium Boxes

Template Page

  1. ✅ - Popcorn
  2. ✅ - Bastard
  3. ✅ - Tenten
  4. ✅ - Cronos
  5. ✅ - October
  6. ✅ - Lazy
  7. ✅ - Sneaky
  8. ✅ - Haircut
  9. ✅ - Europa
  10. ✅ - Nineveh
  11. ✅ - Apocalyst
  12. ✅ - SolidState
  13. ✅ - Node
  14. ✅ - Enterprise
  15. ✅ - Jeeves
  16. ✅ - Inception
  17. ✅ - FluxCapacitor
  18. ✅ - Chatterbox
  19. ✅ - Aragog
  20. ✅ - Bart
  21. ✅ - Stratosphere
  22. ✅ - Celestial
  23. ✅ - Silo
  24. ✅ - Poison
  25. ✅ - Canape
  26. ✅ - Olympus
  27. ✅ - TartarSauce
  28. ✅ - DevOops
  29. ✅ - Hawk
  30. ✅ - Waldo
  31. ✅ - SecNotes
  32. ✅ - Giddy
  33. ✅ - Ypuffy
  34. ✅ - Carrier
  35. ✅ - Vault
  36. ✅ - Redcross
  37. ✅ - Lightweight
  38. ✅ - Chaos
  39. ✅ - Querier
  40. ✅ - Arkham
  41. ✅ - Unattended
  42. ✅ - Luke
  43. ✅ - Jarvis
  44. ✅ - Craft
  45. ✅ - Bitlab
  46. ✅ - Wall
  47. ✅ - Json
  48. ✅ - AI
  49. ✅ - Sniper
  50. ✅ - Mango
  51. ✅ - Obscurity
  52. ✅ - Monteverde
  53. ✅ - Book
  54. ✅ - Cascade
  55. ✅ - Magic
  56. ✅ - Cache
  57. ✅ - Fuse
  58. ✅ - SneakyMailer
  59. ✅ - OpenKeyS
  60. ✅ - Worker
  61. ✅ - Passage
  62. ✅ - Jewel
  63. ✅ - Bucket
  64. ✅ - Time
  65. ✅ - Ready
  66. ✅ - Tenet
  67. ✅ - Ophiuchi

Hack The Box - Hard Boxes

Template Page

  1. ✅ - Joker
  2. ✅ - Calamity
  3. ✅ - Charon
  4. ✅ - Shrek
  5. ✅ - Mantis
  6. ✅ - Kotarak
  7. ✅ - Tally
  8. ✅ - CrimeStoppers
  9. ✅ - Falafel
  10. ✅ - Dropzone

Recurrent Tricks

Template Page

  1. ✅ - File transfers
  2. ✅ - reverse shells with XC
  3. ✅ - SSH Tunnels
  4. ✅ - Intercepting HTTP and HTTPS requests with Burpsuite

The Concept of Hacking

The Goal is to capture both the User and the Root flags by gaining unauthorized access to the machines on HTB's private network, in order to get the flags, one has to employ various sets of pentesting skills, from finding out common vulnerabilities in the easier boxes, to crafting custom-exploitation for the harder boxes.

Binary Exploitation

gdb, gef, ghidra, pwntools, assembly, C, 32-64bit binaries, reverse engineering, CTF challenges


Nihilist
Donate XMR to Nihilist:
8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o
7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8