Ekoparty 2022 BFS Windows Challenge
xct2022-11-07T20:24:46+00:00In this blog post, we will solve the Windows userland challenge that Blue Frost Security published for Ekoparty 2022.
Windows Kernel Exploitation – Arbitrary Memory Mapping (x64)
xct2022-09-24T11:13:51+00:00In this post, we will develop an exploit for the HW driver. I picked this one because I looked for some real-life target to practice on and saw a post by Avast that mentioned vulnerabilities in an old version of this driver (Version 4.8.2 from 2015), that was used as...
SQLi, LFI to RCE and Unintended Privesc via XAMLX & Impersonation – StreamIO @ HackTheBox
xct2022-09-17T14:42:22+00:00Video & additional notes for StreamIO, a medium difficulty Windows machine on HackTheBox that involves manual MSSQL Injection, going from file inclusion to RCE and in this case getting the SeImpersonate privilege back to get SYSTEM via an EFS-based potato.
Browser Exploitation: Firefox OOB to RCE
xct2022-09-09T12:07:57+00:00In this post, we will exploit Midenios, a good introductory browser exploitation challenge that was originally used for the HackTheBox Business-CTF. I had some experience exploiting IE/Edge/Chrome before, but exploiting Firefox was mostly new to me.
Resource-Based Constrained Delegation – Resourced @ PG-Practice
xct2022-08-27T15:48:11+00:00Video & additional notes for Resourced, an intermediate difficulty Windows machine on PG-Practice that involves password spraying and an RBCD attack.
Active Directory, JEA & Random Stuff – Acute @ HackTheBox
xct2022-07-27T06:52:59+00:00Acute is a 40-point Active Directory Windows machine on HackTheBox. I'm going to use it to show some techniques which can be useful in other scenarios and keep it short on the things that are not that important.