<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>HTB Medium on Aditya Telange</title><link>https://adityatelange.in/tags/htb-medium/</link><description>Recent content in HTB Medium on Aditya Telange</description><image><title>Aditya Telange</title><url>https://adityatelange.in/assets/tn.jpg</url><link>https://adityatelange.in/assets/tn.jpg</link></image><generator>Hugo -- 0.156.0</generator><language>en</language><copyright>2020 - 2026 Aditya Telange</copyright><lastBuildDate>Sun, 06 Jul 2025 19:50:00 +0530</lastBuildDate><atom:link href="https://adityatelange.in/tags/htb-medium/index.xml" rel="self" type="application/rss+xml"/><item><title>HackTheBox (HTB) - Escape</title><link>https://adityatelange.in/writeups/hackthebox/escape/</link><pubDate>Sun, 06 Jul 2025 19:50:00 +0530</pubDate><guid>https://adityatelange.in/writeups/hackthebox/escape/</guid><description>Escape is a medium-difficulty Windows machine on Hack The Box that revolves around Active Directory. The initial foothold is gained by finding credentials in a PDF file on an open SMB share. This access is then leveraged to connect to an MSSQL service, from which we capture and crack the NTLM hash of a service account. Lateral movement is achieved by discovering another user&amp;rsquo;s credentials in a log file. Finally, privilege escalation to Administrator is accomplished by exploiting a misconfiguration in Active Directory Certificate Services (ADCS), specifically the ESC1 vulnerability.</description></item><item><title>HackTheBox (HTB) - Resolute</title><link>https://adityatelange.in/writeups/hackthebox/resolute/</link><pubDate>Sun, 29 Jun 2025 19:00:00 +0530</pubDate><guid>https://adityatelange.in/writeups/hackthebox/resolute/</guid><description>Resolute is a medium-difficulty Windows machine on HackTheBox that involves a realistic Active Directory penetration test. The initial foothold is gained by enumerating domain users via a null SMB session and discovering a default password in a user&amp;rsquo;s description, which is then reused to gain access as another user via WinRM. Lateral movement is achieved by discovering cleartext credentials for a more privileged user within PowerShell transcripts. Finally, privilege escalation to SYSTEM is accomplished by abusing the permissions of the DnsAdmins group to load a malicious DLL.</description></item><item><title>HackTheBox (HTB) - Certified</title><link>https://adityatelange.in/writeups/hackthebox/certified/</link><pubDate>Thu, 20 Mar 2025 20:40:31 +0530</pubDate><guid>https://adityatelange.in/writeups/hackthebox/certified/</guid><description>&lt;code&gt;Certified&lt;/code&gt; is a Windows machine having misconfigured ACL in Active Directory environment where initial access for a low-privileged user &lt;code&gt;judith.mader&lt;/code&gt; is provided. Exploitation of the Active Directory Certificate Service (ADCS) is required to get access to the &lt;code&gt;management_svc&lt;/code&gt;, &lt;code&gt;ca_operator&lt;/code&gt; and &lt;code&gt;Administrator&lt;/code&gt; account by abusing shadow credentials and &lt;code&gt;ESC9&lt;/code&gt;.</description></item><item><title>HackTheBox (HTB) - Forge</title><link>https://adityatelange.in/writeups/hackthebox/forge/</link><pubDate>Sat, 22 Jan 2022 21:27:29 +0530</pubDate><guid>https://adityatelange.in/writeups/hackthebox/forge/</guid><description>&lt;fieldset&gt;&lt;legend&gt;Box Info&lt;/legend&gt;&lt;ul&gt;
&lt;li&gt;Name: &lt;a href="https://www.hackthebox.com/machines/forge"&gt;&lt;code&gt;Forge&lt;/code&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;OS: &lt;code&gt;Linux&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Difficulty: &lt;code&gt;Medium&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;IP: &lt;code&gt;10.10.11.111&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Points: &lt;code&gt;30&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Machine Creator: &lt;a href="https://app.hackthebox.eu/users/393721"&gt;&lt;code&gt;NoobHacker9999&lt;/code&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/fieldset&gt;
&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Forge is a fun box on Hackthebox that has a &lt;em&gt;File Upload functionality&lt;/em&gt; which is vulnerable to &lt;code&gt;SSRF&lt;/code&gt;.
This exposes the &lt;em&gt;internal Admin panel&lt;/em&gt; and lets us read files with &lt;em&gt;internal FTP service&lt;/em&gt;, which includes SSH key pair of the user.&lt;/p&gt;
&lt;p&gt;Listing the available commands we can run as a superuser, we have a &lt;em&gt;python script&lt;/em&gt; which opens a &lt;em&gt;socket connection&lt;/em&gt;.
This calls &lt;em&gt;PDB&lt;/em&gt; with an exception occurs, with which we get a shell as &lt;code&gt;root&lt;/code&gt;.&lt;/p&gt;</description></item><item><title>HackTheBox (HTB) - Pit</title><link>https://adityatelange.in/writeups/hackthebox/pit/</link><pubDate>Sat, 25 Sep 2021 00:00:00 +0530</pubDate><guid>https://adityatelange.in/writeups/hackthebox/pit/</guid><description>Pit is a fun box where &lt;code&gt;SNMP&lt;/code&gt; Data reveals that &lt;code&gt;seeddms&lt;/code&gt; instance is running, which is vulnerable to RCE.
The box has CentOS’s Cockpit Web Console on port &lt;code&gt;9090&lt;/code&gt;, which uses reused password from DB credentials. This gives access to user shell.
LinPeas reveals there is a &lt;code&gt;monitoring&lt;/code&gt; service, which runs bash scripts in a particular directory. Chaining this with SNMPwalk gives us &lt;code&gt;root&lt;/code&gt;.</description></item><item><title>HackTheBox (HTB) - Tenet</title><link>https://adityatelange.in/writeups/hackthebox/tenet/</link><pubDate>Sat, 12 Jun 2021 00:00:00 +0530</pubDate><guid>https://adityatelange.in/writeups/hackthebox/tenet/</guid><description>Tenet is a fun box where we find a backup of a staging PHP file which loads external code via deserialization, which leads to code-execution and a reverse shell. This leads to access to a script which the non-sudoer user can run to add ssh-key for getting root shell.</description></item><item><title>HackTheBox (HTB) - Ready</title><link>https://adityatelange.in/writeups/hackthebox/ready/</link><pubDate>Sat, 15 May 2021 00:00:00 +0530</pubDate><guid>https://adityatelange.in/writeups/hackthebox/ready/</guid><description>Ready is a fun box which is using an outdated GitLab community version. Which apparently has an exploit which gives RCE to authenticated users.
This RCE gives access to docker container in which gitlab instance is running, and we have to breakout the container to escalate our privilages to get own root!</description></item></channel></rss>