Skip to main content

CTF write-ups

A Collection Of My Writeups for Various Capture the Flag challenges. Mostly from TryHackMe

TryHackMe: RabbitStore

·1537 words·8 mins
A medium TryHackMe box chaining mass assignment, SSRF, and Jinja2 SSTI to gain initial access, then escalating to root by leveraging an exposed Erlang cookie to extract credentials from a misconfigured RabbitMQ service.

TryHackMe: Hammer

·1795 words·9 mins
A Medium Rated PHP web app challenge chaining exposed logs, OTP brute force via rate limit bypass, and JWT forgery to achieve remote command execution

TryHackMe: Include

·1825 words·9 mins
Medium difficulty web challenge focusing on server side vulnerabilities

TryHackMe: K2-Summit

·2471 words·12 mins
Hard Active Directory box Leverage credential reuse for initial access, identify a privileged user via BloodHound, hijack a scheduled script for lateral movement, then perform an RBCD attack to compromise the root domain controller

TryHackMe: K2-MiddleCamp

·2615 words·13 mins
Hard Active Directory environment consisting of enumeration, credential spraying, BloodHound analysis, privilege escalation via Backup Operators group

TryHackMe: K2-BaseCamp

·3094 words·15 mins
Hard Linux Box including: web enumeration, vhost discovery, jwt token manipulation, SQL Injection, Linux Privilege Escalation

TryHackMe: AVenger

·3027 words·15 mins
Medium difficulty Active Directory box focusing on Web Enumeration, File Upload Abuse, AV Evasion, Uac bypass

TryHackMe: Reset

·1845 words·9 mins
A hard Active Directory compromise that chained weak credential hygiene, SMB guest access, password spraying, AS-REP roasting, and registry credential leaks into a full BloodHound-guided escalation, ultimately abusing Kerberos delegation (RBCD) to impersonate Administrator and achieve domain compromise.

TryHackMe: Injectics

·1629 words·8 mins
A medium difficulty web exploitation chain where exposed admin interfaces, logic flaws, and SQL injection were leveraged to reset credentials, ultimately escalating to admin access and achieving RCE via a vulnerable Twig SSTI.

TryHackMe: LookBack

·644 words·4 mins
Easy Active Directory box exploiting misconfigured OWA

TryHackMe: Stealth

·603 words·3 mins
Medium difficulty defense evasion box featuring a scheduled task privilege escalation vector

TryHackMe: Ledger

·1706 words·9 mins
Hard Active Directory box exploiting anonymous LDAP access and AD CS ESC1 misconfiguration