Hack The Box - HTB Previous Writeup - Medium - Weekly - August 23th, 2025

Hack The Box - HTB Previous Writeup - Medium - Weekly - August 23th, 2025

In the labyrinth of Previous, a Next.js application whispers its secrets through middleware's loose lips, where path traversal—that ancient art of asking "../" until the system confesses—meets modern framework hubris. A developer's breakfast preference, immortalized in authentication's fallback logic, becomes the skeleton key to SSH's front door. The final act sees Terraform, infrastructure's faithful automaton, deceived into crowning a false provider with root's scepter—a classic substitution cipher executed in the filesystem. This machine teaches us that every framework's convenience method, every hardcoded "temporary" solution, and every automation tool's helpful override becomes another note in the penetration tester's symphony, where the melody is always "trust, but verify" played backwards.
Hack The Box - HTB CodeTwo Writeup - Easy- Weekly - August 20th, 2025

Hack The Box - HTB CodeTwo Writeup - Easy- Weekly - August 20th, 2025

In the realm where JavaScript breaks free from js2py's illusory cage, CodeTwo reveals how sandboxes built on trust become doorways to forbidden Python realms. Through MD5's ancient weakness and a backup tool crowned with sudo's blind faith, we witness the cascade from web interpreter to root throne. This digital parable teaches that every convenience—from code execution to password reuse to privileged utilities—becomes a stepping stone for those who understand that security's greatest vulnerabilities often hide behind the mask of helpful features.
Hack The Box - HTB Cobblestone Writeup - Insane- Season 8 Weekly - August 9nd, 2025

Hack The Box - HTB Cobblestone Writeup - Insane- Season 8 Weekly - August 9nd, 2025

In the architecture of digital cobblestones, where voting systems whisper secrets through injection flaws, one discovers that databases hold more than data—they guard the keys to deeper realms. Through the ancient art of provisioning services and XML-RPC whispers, we learn that even the most trusted builders of systems can become unwitting architects of their own undoing. This pilgrimage through SQL sanctuaries and Cobbler's forge reminds us that in the realm of cybersecurity, every stone laid in haste becomes a stepping stone for those who seek to understand the hidden pathways beneath.
Comparing Upscaling Models: RealESR_Gx4, RealESR_Animex4, BSRGANx4, BSRGANx2, RealESRGANx4, IRCNN_Mx1, and IRCNN_Lx1

Comparing Upscaling Models: RealESR_Gx4, RealESR_Animex4, BSRGANx4, BSRGANx2, RealESRGANx4, IRCNN_Mx1, and IRCNN_Lx1

Each model reveals its own Zen, where the balance of speed, style, and detail crafts a visual mantra: RealESR_Gx4 offers calm clarity for everyday scenes, RealESR_Animex4 captures the crisp soul of anime, and BSRGANs embrace nature’s raw texture, reminding us that beauty thrives in the harmony of technical art and the inherent imperfection of reality.