Skip to content

HTB write-ups with detailed walkthroughs, screenshots, and tutorials for ethical hacking, CTF challenges, and penetration testing.

Notifications You must be signed in to change notification settings

Esther7171/HackTheBox-Writeups-Walkthroughs

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

63 Commits
 
 
 
 

Repository files navigation

Hack The Box (HTB) Write-ups Repository

Welcome to my Hack The Box (HTB) write-ups repository, a comprehensive collection of hands-on cybersecurity walkthroughs. This repository covers HTB Academy labs, challenges, and machines, including detailed step-by-step guides, screenshots, and relevant resources to help beginners and professionals sharpen their penetration testing and ethical hacking skills.


📂 Repository Structure

Category Subcategory Description
Academy Labs 00. Intro to Academy Beginner guides with images, fundamentals of Linux, Windows, Networking, Web apps, Bash scripting, and JavaScript deobfuscation
01. Pre-Engagement Learning process, Penetration testing workflow, setup guides, Linux & Windows fundamentals, Networking basics, Web requests
02. Information Gathering Nmap, Python scripting, DNS enumeration, OSINT, footprinting, corporate recon
03. Vulnerability Assessment Vulnerability scanning and Metasploit usage
04. Exploitation Password attacks, service exploitation, pivoting, AD enumeration
05. Web Exploitation Web proxies, Ffuf, SQLi, XSS, File Inclusion, Command Injection, Web apps security
06. Post-Exploitation Linux & Windows privilege escalation
07. Lateral Movement Techniques for moving across networked systems
08. Proof-of-Concept Buffer overflows, intro to assembly
09. Post-Engagement Reporting, documentation, attacking enterprise networks
10. Misc MacOS fundamentals, Secure coding, Whitebox pentesting
Challenges Name Description
0ld is g0ld Linux challenge Beginner-friendly CTF
ArtificialUniversity Linux/Windows challenge Exploitation and enumeration
baby nginxatsu Web exploitation Nginx configuration exploitation
Baby RE Reverse engineering Binary analysis
Baby Time Capsule Forensics File recovery and timeline analysis
Under Construction Various Placeholder for future challenges

Note: Each challenge folder contains step-by-step write-ups, screenshots, and supporting files.

Machines Difficulty Type Exploitation Techniques
BoardLight Easy Linux CVE-2023-30253
Canvas Medium Linux Web app exploitation, LFI, SQLi
Curling Medium Linux Network exploitation
Editor Easy Windows Password attacks
Eternal-Loop Hard Linux Privilege escalation
Fluffy Medium Windows AD enumeration
Triangles Hard Linux Advanced pivoting & post-exploitation

🚀 Future Additions: Sherlock write-ups and more machines/challenges will be added regularly.


📈 Features & Benefits

  • Step-by-step walkthroughs: Designed for beginners and professionals alike.
  • Visual guidance: Screenshots and images included in all labs.
  • Hands-on learning: Focused on practical skills rather than theory.
  • Covers multiple topics: Linux, Windows, Web, Networking, AD, Pentesting tools.

🤝 Contributing

Contributions are highly welcome! You can submit pull requests or suggest improvements while adhering to HTB’s rules:

  • Avoid spoilers for active machines.
  • Focus on educational content and learning resources.
  • Maintain clear and structured guides with images and references.

Build your cybersecurity skills safely and ethically. Happy hacking! 🚀