<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>securitea.tech</title><description>HTB writeups, pentesting walkthroughs, and security research.</description><link>https://securitea.tech/</link><language>en</language><lastBuildDate>Sun, 12 Apr 2026 16:05:12 GMT</lastBuildDate><atom:link href="https://securitea.tech/rss.xml" rel="self" type="application/rss+xml"/><item><title>HTB: Jail</title><link>https://securitea.tech/blog/htb-jail/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-jail/</guid><description>A stack buffer overflow with socket-reuse shellcode, NFS SUID escalation via raw syscall assembly, an rvim Python escape, and PwnKit combine for a four-stage privilege escalation on CentOS 7.</description><pubDate>Fri, 16 Sep 2022 00:00:00 GMT</pubDate><category>htb</category><category>linux</category><category>nfs</category><category>buffer-overflow</category><category>rvim</category><category>restricted-shell</category></item><item><title>HTB: Brainfuck</title><link>https://securitea.tech/blog/htb-brainfuck/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-brainfuck/</guid><description>A six-step attack chain across WordPress, SMTP, POP3, a Flarum forum with Vigenere encryption, SSH key cracking, and RSA cryptanalysis delivers the root flag without ever gaining a root shell.</description><pubDate>Fri, 09 Sep 2022 00:00:00 GMT</pubDate><category>htb</category><category>linux</category><category>wordpress</category><category>smtp</category><category>vigenere</category><category>crypto</category><category>lxc</category><category>rsa</category></item><item><title>HTB: WingData</title><link>https://securitea.tech/blog/htb-wingdata/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-wingdata/</guid><description>A NULL byte in Wing FTP Server&apos;s login handler triggers Lua code injection for unauthenticated RCE, then a Python tarfile data filter bypass via PATH_MAX overflow writes an SSH key to root.</description><pubDate>Fri, 02 Sep 2022 00:00:00 GMT</pubDate><category>htb</category><category>windows</category><category>web</category><category>api</category><category>privilege-escalation</category></item><item><title>HTB: Pterodactyl</title><link>https://securitea.tech/blog/htb-pterodactyl/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-pterodactyl/</guid><description>A critical LFI in Pterodactyl Panel&apos;s locale endpoint chains with pearcmd.php for unauthenticated RCE, then a PAM environment injection and udisks2 XFS resize race condition deliver root on openSUSE.</description><pubDate>Fri, 26 Aug 2022 00:00:00 GMT</pubDate><category>htb</category><category>linux</category><category>pterodactyl-panel</category><category>web</category><category>privilege-escalation</category></item><item><title>HTB: Kobold</title><link>https://securitea.tech/blog/htb-kobold/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-kobold/</guid><description>An MCPJam Inspector RCE for initial access, PrivateBin template cookie LFI for container-level code execution, database password reuse across services, and a Docker management API that mounts the host root filesystem.</description><pubDate>Fri, 19 Aug 2022 00:00:00 GMT</pubDate><category>htb</category><category>linux</category><category>web</category><category>ssrf</category><category>privilege-escalation</category></item><item><title>HTB: Interpreter</title><link>https://securitea.tech/blog/htb-interpreter/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-interpreter/</guid><description>Pre-authentication Java deserialisation in Mirth Connect, PBKDF2 hash cracking of a dictionary password, and a Python f-string template injection in a root-owned Flask service for privilege escalation.</description><pubDate>Fri, 12 Aug 2022 00:00:00 GMT</pubDate><category>htb</category><category>windows</category><category>custom-interpreter</category><category>reverse-engineering</category><category>binary-exploitation</category></item><item><title>HTB: CCTV</title><link>https://securitea.tech/blog/htb-cctv/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-cctv/</guid><description>Default credentials on ZoneMinder, a time-based blind SQL injection to extract bcrypt hashes, SSH password reuse, and a motionEye command injection running as root through a surveillance daemon&apos;s notification configuration.</description><pubDate>Fri, 05 Aug 2022 00:00:00 GMT</pubDate><category>htb</category><category>windows</category><category>web</category><category>reverse-engineering</category><category>binary-exploitation</category></item><item><title>HTB: Holiday</title><link>https://securitea.tech/blog/htb-holiday/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-holiday/</guid><description>A Linux box combining SQL injection for credential extraction, stored XSS with aggressive filter bypass to steal an admin cookie, command injection through a character-restricted export endpoint, and sudo npm install for root.</description><pubDate>Fri, 29 Jul 2022 00:00:00 GMT</pubDate><category>htb</category><category>linux</category><category>xss</category><category>stored-xss</category><category>command-injection</category><category>npm</category><category>sudo</category></item><item><title>HTB: Charon</title><link>https://securitea.tech/blog/htb-charon/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-charon/</guid><description>A multi-stage Linux box requiring two SQL injection points, a case-sensitive keyword filter bypass, a hidden base64 upload field, RSA key factorisation, and a SUID binary with a newline injection to reach root.</description><pubDate>Fri, 22 Jul 2022 00:00:00 GMT</pubDate><category>htb</category><category>linux</category><category>sql-injection</category><category>rsa</category><category>upload-bypass</category><category>suid</category></item><item><title>HTB: Calamity</title><link>https://securitea.tech/blog/htb-calamity/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-calamity/</guid><description>A 32-bit Linux box with hardcoded credentials, a PHP code injection endpoint, audio steganography for SSH credentials, and an LXD group membership that provides a container escape to root.</description><pubDate>Fri, 15 Jul 2022 00:00:00 GMT</pubDate><category>htb</category><category>linux</category><category>buffer-overflow</category><category>audio-steganography</category><category>lxc</category></item><item><title>HTB: Garfield</title><link>https://securitea.tech/blog/htb-garfield/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-garfield/</guid><description>An Active Directory domain with a Read-Only Domain Controller whose Password Replication Policy is writable by a Tier 1 admin, enabling the KERB-KEY-LIST attack to extract the Administrator&apos;s NT hash.</description><pubDate>Fri, 08 Jul 2022 00:00:00 GMT</pubDate><category>htb</category><category>windows</category><category>active-directory</category><category>rodc</category><category>kerberos</category></item><item><title>HTB: Facts</title><link>https://securitea.tech/blog/htb-facts/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-facts/</guid><description>A path traversal in Camaleon CMS exposes Rails master keys, SQLite databases, and authentication tokens, enabling admin takeover through cookie forgery on a Ruby on Rails 8 application.</description><pubDate>Fri, 01 Jul 2022 00:00:00 GMT</pubDate><category>htb</category><category>linux</category><category>web</category><category>enumeration</category><category>privilege-escalation</category></item><item><title>HTB: PiHole</title><link>https://securitea.tech/blog/htb-pihole/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-pihole/</guid><description>Default Raspberry Pi credentials bypass the Pi-hole web surface entirely, passwordless sudo delivers root, and a deleted flag requires raw block device recovery with strings.</description><pubDate>Fri, 24 Jun 2022 00:00:00 GMT</pubDate><category>htb</category><category>linux</category><category>pi-hole</category><category>dns</category><category>command-injection</category><category>docker</category></item><item><title>HTB: DevArea</title><link>https://securitea.tech/blog/htb-devarea/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-devarea/</guid><description>Apache CXF MTOM SSRF reads credentials from systemd unit files, Hoverfly middleware provides RCE, and a world-writable /usr/bin/bash combined with a sudoers negation bypass delivers root.</description><pubDate>Fri, 17 Jun 2022 00:00:00 GMT</pubDate><category>htb</category><category>linux</category><category>git</category><category>source-code-review</category><category>api</category></item><item><title>HTB: Inception</title><link>https://securitea.tech/blog/htb-inception/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-inception/</guid><description>A layered exploitation chain through dompdf LFI, WebDAV file upload, LXC container escape via anonymous FTP reconnaissance, and apt pre-invoke hook injection through TFTP.</description><pubDate>Fri, 10 Jun 2022 00:00:00 GMT</pubDate><category>htb</category><category>linux</category><category>squid-proxy</category><category>webdav</category><category>dompdf</category><category>pivoting</category></item><item><title>HTB: Nineveh</title><link>https://securitea.tech/blog/htb-nineveh/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-nineveh/</guid><description>A multi-stage chain through phpLiteAdmin, LFI with path filtering, steganographic SSH key extraction, and a chkrootkit privilege escalation on an Ubuntu 16.04 host.</description><pubDate>Fri, 03 Jun 2022 00:00:00 GMT</pubDate><category>htb</category><category>linux</category><category>brute-force</category><category>lfi</category><category>phpinfo</category><category>port-knocking</category><category>chkrootkit</category></item><item><title>HTB: Apocalyst</title><link>https://securitea.tech/blog/htb-apocalyst/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-apocalyst/</guid><description>A steganographic wordlist hidden in a WordPress uploads image provides the admin password through brute-force, then a world-readable .secret file and LXD group membership deliver root via container escape.</description><pubDate>Fri, 27 May 2022 00:00:00 GMT</pubDate><category>htb</category><category>linux</category><category>wordpress</category><category>steganography</category><category>brute-force</category><category>directory-enumeration</category></item><item><title>HTB: Lazy</title><link>https://securitea.tech/blog/htb-lazy/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-lazy/</guid><description>A padding oracle in a custom PHP authentication cookie enables CBC bit-flipping to forge admin access, exposing an SSH key. A SUID binary with a relative PATH call to cat completes the root chain.</description><pubDate>Fri, 20 May 2022 00:00:00 GMT</pubDate><category>htb</category><category>linux</category><category>padding-oracle</category><category>crypto</category><category>suid</category><category>path-hijack</category></item><item><title>HTB: October</title><link>https://securitea.tech/blog/htb-october/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-october/</guid><description>Default credentials on October CMS grant admin access, the code editor provides RCE as www-data, and a 32-bit SUID buffer overflow with ASLR brute-force delivers root in under ten seconds.</description><pubDate>Fri, 13 May 2022 00:00:00 GMT</pubDate><category>htb</category><category>linux</category><category>october-cms</category><category>file-upload</category><category>buffer-overflow</category><category>suid</category></item><item><title>HTB: TenTen</title><link>https://securitea.tech/blog/htb-tenten/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-tenten/</guid><description>A WordPress Job Manager plugin leaks uploaded file names through predictable post IDs, revealing a steganographic image that hides an encrypted SSH key. A misconfigured sudo rule on /bin/fuckin completes the chain to root.</description><pubDate>Fri, 06 May 2022 00:00:00 GMT</pubDate><category>htb</category><category>linux</category><category>wordpress</category><category>steganography</category><category>ssh</category><category>cve-2015-6668</category></item><item><title>HTB: Bastard</title><link>https://securitea.tech/blog/htb-bastard/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-bastard/</guid><description>Drupalgeddon 2 delivers unauthenticated RCE on a Windows Server 2008 R2 box with zero hotfixes, then JuicyPotato turns an IIS service account into SYSTEM via COM/DCOM token impersonation.</description><pubDate>Fri, 29 Apr 2022 00:00:00 GMT</pubDate><category>htb</category><category>windows</category><category>drupal</category><category>php</category><category>kernel-exploit</category><category>ms15-051</category></item><item><title>HTB: Europa</title><link>https://securitea.tech/blog/htb-europa/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-europa/</guid><description>An SQL injection bypass on a TLS-disclosed admin portal leads to PHP code execution via preg_replace&apos;s /e modifier, then a writable cron script grants root.</description><pubDate>Fri, 22 Apr 2022 00:00:00 GMT</pubDate><category>htb</category><category>linux</category><category>sql-injection</category><category>openvpn</category><category>regex</category><category>preg_replace</category></item><item><title>HTB: Cronos</title><link>https://securitea.tech/blog/htb-cronos/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-cronos/</guid><description>DNS zone transfer discloses a hidden admin subdomain, SQL injection bypasses authentication, command injection provides a shell, and a writable cron script escalates to root.</description><pubDate>Fri, 15 Apr 2022 00:00:00 GMT</pubDate><category>htb</category><category>linux</category><category>dns</category><category>sql-injection</category><category>command-injection</category><category>cron</category></item><item><title>HTB: Beep</title><link>https://securitea.tech/blog/htb-beep/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-beep/</guid><description>An Elastix PBX system with 15 open ports, a universal password across every service, and a local file inclusion that discloses credentials from the configuration file.</description><pubDate>Fri, 08 Apr 2022 00:00:00 GMT</pubDate><category>htb</category><category>linux</category><category>elastix</category><category>lfi</category><category>voip</category><category>shellshock</category></item><item><title>HTB: Bank</title><link>https://securitea.tech/blog/htb-bank/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-bank/</guid><description>A DNS zone transfer leaks the domain, a failed encryption process exposes plaintext credentials, a debug file extension bypass enables a webshell, and a custom SUID binary gives instant root.</description><pubDate>Fri, 01 Apr 2022 00:00:00 GMT</pubDate><category>htb</category><category>linux</category><category>file-upload</category><category>dns</category><category>suid</category></item><item><title>HTB: Blocky</title><link>https://securitea.tech/blog/htb-blocky/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-blocky/</guid><description>A custom Minecraft plugin with hardcoded database credentials leads to SSH access via credential reuse, and sudo group membership completes the chain to root.</description><pubDate>Fri, 25 Mar 2022 00:00:00 GMT</pubDate><category>htb</category><category>linux</category><category>minecraft</category><category>java</category><category>credential-reuse</category><category>wordpress</category></item><item><title>HTB: Optimum</title><link>https://securitea.tech/blog/htb-optimum/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-optimum/</guid><description>A null byte injection in Rejetto HFS 2.3 gives unauthenticated RCE, and a Secondary Logon race condition escalates to SYSTEM on an unpatched Windows Server 2012 R2.</description><pubDate>Fri, 18 Mar 2022 00:00:00 GMT</pubDate><category>htb</category><category>hfs</category><category>windows</category><category>rejetto</category><category>cve-2014-6287</category></item><item><title>HTB: Grandpa</title><link>https://securitea.tech/blog/htb-grandpa/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-grandpa/</guid><description>A buffer overflow in IIS 6.0&apos;s WebDAV handler delivers code execution on Windows Server 2003, and token kidnapping completes the escalation to SYSTEM.</description><pubDate>Fri, 11 Mar 2022 00:00:00 GMT</pubDate><category>htb</category><category>iis</category><category>webdav</category><category>windows</category><category>token-impersonation</category><category>cve-2017-7269</category></item><item><title>HTB: Granny</title><link>https://securitea.tech/blog/htb-granny/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-granny/</guid><description>IIS 6.0 with WebDAV enabled permits unauthenticated file upload via PUT and MOVE, bypassing extension restrictions to deploy an ASPX webshell. Token kidnapping (MS09-012) escalates NETWORK SERVICE to SYSTEM on Windows Server 2003.</description><pubDate>Fri, 04 Mar 2022 00:00:00 GMT</pubDate><category>htb</category><category>iis</category><category>webdav</category><category>windows</category><category>token-impersonation</category></item><item><title>HTB: Arctic</title><link>https://securitea.tech/blog/htb-arctic/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-arctic/</guid><description>Adobe ColdFusion 8 on Windows Server 2008 R2 yields unauthenticated RCE through a three-part chain: directory traversal for credential extraction, FCKeditor file upload, and LFI-based CFML code injection. MS10-059 escalates to SYSTEM when JuicyPotato fails.</description><pubDate>Fri, 25 Feb 2022 00:00:00 GMT</pubDate><category>htb</category><category>coldfusion</category><category>windows</category><category>directory-traversal</category><category>privilege-escalation</category></item><item><title>HTB: Sense</title><link>https://securitea.tech/blog/htb-sense/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-sense/</guid><description>Default credentials and a plaintext credential disclosure file on a pfSense 2.1.3 appliance lead to authenticated command injection (CVE-2016-10709) running as root. The box demonstrates why network appliances are high-value targets: they run as root by design.</description><pubDate>Fri, 18 Feb 2022 00:00:00 GMT</pubDate><category>htb</category><category>pfsense</category><category>openbsd</category><category>command-injection</category><category>firewall</category></item><item><title>HTB: Shocker</title><link>https://securitea.tech/blog/htb-shocker/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-shocker/</guid><description>A CGI bash script on Apache 2.4.18 is vulnerable to Shellshock (CVE-2014-6271), yielding RCE via a crafted User-Agent header. A sudo NOPASSWD entry for Perl completes the path to root. The real challenge is handling stdout pollution in CGI context.</description><pubDate>Fri, 11 Feb 2022 00:00:00 GMT</pubDate><category>htb</category><category>linux</category><category>shellshock</category><category>cgi</category><category>bash</category><category>cve-2014-6271</category></item><item><title>HTB: Bashed</title><link>https://securitea.tech/blog/htb-bashed/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-bashed/</guid><description>A developer leaves a PHP web shell in a publicly accessible directory, then compounds the mistake with a sudo misconfiguration and a root cron job reading from a user-writable directory. Three independent failures chain into full system compromise.</description><pubDate>Fri, 04 Feb 2022 00:00:00 GMT</pubDate><category>htb</category><category>linux</category><category>webshell</category><category>phpbash</category><category>sudo</category></item><item><title>HTB: Blue</title><link>https://securitea.tech/blog/htb-blue/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-blue/</guid><description>EternalBlue (MS17-010) turns an SMB-only Windows 7 host into a SYSTEM shell in under a minute. The box is a single-exploit machine, but the methodology around blind command execution and exfiltration via writable shares is worth studying.</description><pubDate>Fri, 28 Jan 2022 00:00:00 GMT</pubDate><category>htb</category><category>smb</category><category>ms17-010</category><category>eternalblue</category><category>windows</category></item><item><title>HTB: Devel</title><link>https://securitea.tech/blog/htb-devel/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-devel/</guid><description>Anonymous FTP write access to an IIS web root creates a trivial foothold. The real lesson is in the privilege escalation — unpatched Windows 7 with no service packs is a kernel exploit playground.</description><pubDate>Fri, 21 Jan 2022 00:00:00 GMT</pubDate><category>htb</category><category>ftp</category><category>iis</category><category>aspx</category><category>windows</category><category>kernel-exploit</category><category>privilege-escalation</category><category>ms11-046</category></item><item><title>HTB: Legacy</title><link>https://securitea.tech/blog/htb-legacy/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-legacy/</guid><description>MS08-067 on Windows XP — the vulnerability that powered the Conficker pandemic. A deep dive into the NetAPI32.dll buffer overflow that defined an era of network worms.</description><pubDate>Fri, 14 Jan 2022 00:00:00 GMT</pubDate><category>htb</category><category>smb</category><category>ms08-067</category><category>cve-2008-4250</category><category>buffer-overflow</category><category>windows-xp</category><category>conficker</category></item><item><title>HTB: Lame</title><link>https://securitea.tech/blog/htb-lame/</link><guid isPermaLink="true">https://securitea.tech/blog/htb-lame/</guid><description>A command injection flaw in Samba&apos;s username map script configuration gives unauthenticated root on a Linux host — and a lesson in why the obvious exploit isn&apos;t always the right one.</description><pubDate>Fri, 07 Jan 2022 00:00:00 GMT</pubDate><category>htb</category><category>smb</category><category>samba</category><category>cve-2007-2447</category><category>command-injection</category><category>linux</category><category>vsftpd</category></item></channel></rss>