HackTheBox – BigBang Machine Walkthrough (Hard Difficulty)

Chained exploitation through misconfigured web app and internal services. We started by exploiting a WordPress plugin vulnerability (CVE-2023-26326) to upload files, followed by a file read vulnerability (CVE-2024-2961) for remote code execution. From there, we cracked the database credentials, gained SSH access as the shawking user, and leveraged a vulnerable API endpoint to escalate to root. This highlights how overlooked configurations and service misconfigurations can lead to a full server compromise.

#CTF #PrivilegeEscalation #WebSecurity #CommandInjection #SSH #WordPress #LinuxPentesting #BugBounty #HackTheBox #RedTeam #CyberSecurity

The post HackTheBox – BigBang Machine Walkthrough (Hard Difficulty) appeared first on Threatninja.net.

May 3, 2025
Read More >>

Windows 10 End of Life: What Does it Mean for Your Organisation?

And what are the challenges of migrating to a newer system, such as Windows 11? Windows 10 reaches the end of its lifecycle on 14 October 2025. But what does this mean? What are the challenges of migrating to new systems? What are the security implications? And what are the risks of delaying migration? We put these questions – and others – to our head of security testing, James Pickard. In this interview Hi James. So, what does it mean when systems or software reach the end of their lifecycle? End of life is basically when software or hardware products

The post Windows 10 End of Life: What Does it Mean for Your Organisation? appeared first on IT Governance Blog.

May 2, 2025
Read More >>

Hack The Box: Vintage Machine Walkthrough – Hard Difficulty

Introduction to Vintage: In this writeup, we will explore the “Vintage” machine from Hack The Box, categorized as a Hard difficulty challenge. This walkthrough will cover the reconnaissance, exploitation, and privilege escalation steps required to capture the flag. Objective: The goal of this walkthrough is to complete the “Vintage” machine from Hack The Box by… Read More »Hack The Box: Vintage Machine Walkthrough – Hard Difficulty

The post Hack The Box: Vintage Machine Walkthrough – Hard Difficulty appeared first on Threatninja.net.

April 26, 2025
Read More >>

Hack The Box: Administrator Walkthrough Medium Difficulty

Chained privilege escalation on an AD environment via misconfigured permissions — no CVEs, just clever abuse of default rights. From Olivia to Emily to Ethan, we pivoted through user relationships using BloodHound, CrackMapExec, Kerberoasting, and WinRM access. Highlighting how overlooked configurations can lead to full domain compromise.

#ActiveDirectory #PrivilegeEscalation #BloodHound #Kerberoasting #HackTheBox #RedTeam #CyberSecurity #WindowsPentest

The post Hack The Box: Administrator Walkthrough Medium Difficulty appeared first on Threatninja.net.

April 19, 2025
Read More >>

Hack The Box: LinkVortex Machine Walkthrough Easy Difficulty

Successfully demonstrated advanced cybersecurity skills by exploiting a Ghost CMS vulnerability (CVE-2023-40028) to access sensitive credentials and secure the user flag. Identified and leveraged a sudo misconfiguration with the CHECK_CONTENT variable to escalate privileges and retrieve the root flag from /root/root.txt. Thrived in this hands-on challenge, sharpening penetration testing expertise! #HackTheBox #Cybersecurity #EthicalHacking #PenetrationTesting #CTF

The post Hack The Box: LinkVortex Machine Walkthrough Easy Difficulty appeared first on Threatninja.net.

April 12, 2025
Read More >>