Hack The Box: Builder Machine Walkthrough – Medium Difficulty

In this post, I would like to share a walkthrough of the Builder Machine from Hack the Box This room will be considered a medium machine on Hack the Box What will you gain from the Builder machine? For the user flag, you will need to exploit a recent Jenkins vulnerability, namely CVE-2024-23897, this exploration focuses on its capacity for […]

The post Hack The Box: Builder Machine Walkthrough – Medium Difficulty appeared first on Threatninja.net.

February 13, 2024
Read More >>

Why Windows can’t follow WSL symlinks

By Yarden Shafir Did you know that symbolic links (or symlinks) created through Windows Subsystem for Linux (WSL) can’t be followed by Windows? I recently encountered this rather frustrating issue as I’ve been using WSL for my everyday work over the last few months. No doubt others have noticed it as well, so I wanted […]

February 12, 2024
Read More >>

Hack The Box: Keeper Machine Walkthrough – Easy Difficulty

In this post, I would like to share a walkthrough of the Keeper Machine from Hack the Box This room will be considered an Easy machine on Hack the Box What will you gain from the Keeper machine? For the user flag, you will need to utilize default credentials to gain access to the RT instance, […]

The post Hack The Box: Keeper Machine Walkthrough – Easy Difficulty appeared first on Threatninja.net.

February 10, 2024
Read More >>

Hack The Box: Registrytwo machine Walkthrough – Insane Difficulty

In this post, I would like to share a walkthrough of the Registrytwo Machine from Hack the Box This room will be considered an Insane machine on Hack the Box What will you gain from the Registrytwo machine? For the user flag, you will need to utilize a Docker Registry and authentication server, I will access an image to uncover […]

The post Hack The Box: Registrytwo machine Walkthrough – Insane Difficulty appeared first on Threatninja.net.

February 3, 2024
Read More >>

Hack The Box: Clicker Machine Walkthrough – Medium Difficulty

In this post, I would like to share a walkthrough of the Clicker Machine from Hack the Box This room will be considered a Medium machine on Hack the Box What will you gain from the Clicker machine? For the user flag, you will need a website featuring a game reminiscent of Universal Paperclips. Through meticulous analysis, I’ll uncover a […]

The post Hack The Box: Clicker Machine Walkthrough – Medium Difficulty appeared first on Threatninja.net.

January 27, 2024
Read More >>

Hack The Box: Bookworm Machine Walkthrough – Insane Difficulty

In this post, I would like to share a walkthrough of the Bookworm Machine from Hack the Box. This room will be considered an Insane machine on Hack the Box What will you gain from the Bookworm machine? For the user flag, you will need a sophisticated exploit chain by leveraging cross-site scripting, insecure upload, and […]

The post Hack The Box: Bookworm Machine Walkthrough – Insane Difficulty appeared first on Threatninja.net.

January 21, 2024
Read More >>

Hack The Box: Zipping Machine – Medium Difficulty

In this post, I would like to share a walkthrough of the Zipping Machine from Hack the Box This room will be considered a medium machine on Hack the Box What will you gain from the Zipping machine? For the user flag, you will need to create symbolic links within the zip file and access files from the host file […]

The post Hack The Box: Zipping Machine – Medium Difficulty appeared first on Threatninja.net.

January 13, 2024
Read More >>

Source-Based Gentoo Linux Goes Binary

While Gentoo Linux is best-known as source-based Linux distribution, “our package manager, Portage, already for years also has support for binary packages,” according to its web page. It notes that source- and binary-based package installations can be …

December 31, 2023
Read More >>