HTB Write-Up: Haze
🧠HTB Write-Up: Haze Difficulty: Hard OS: Linux Points: 30 Date: 2025-04-07 🔍 Reconnaissance 🔎 Nmap Scan Results Command Used: nmap -sV -sC 10.xx.xx.xx -v Target Host: 10.xx.xx.
🧠HTB Write-Up: Haze Difficulty: Hard OS: Linux Points: 30 Date: 2025-04-07 🔍 Reconnaissance 🔎 Nmap Scan Results Command Used: nmap -sV -sC 10.xx.xx.xx -v Target Host: 10.xx.xx.
HackTheBox: Artificial - A Journey to Root Overview This post provides a comprehensive walkthrough of the 'Easy' HackTheBox machine "Artificial." We will dissect each phase of
HTB Outbound - Complete Walkthrough Machine Information Attribute Value Target IP 10.x.x.x Hostname mail.outbound.htb OS Ubuntu Linux Difficulty Easy Initial Credentials tyler:LhKL1o9Nm3X2 Reconnaissance Port
Introduction This writeup details the exploitation of the "Artificial" machine from Hack The Box, which showcases interesting vectors involving AI model manipulation and service exploitation. Initial Enumeration First,
Step 1: Recon / Enumeration * Run nmap: nmap -T4 -vv -sC -sV -oN nmap/intial [MACHINE_IP] * Discovered open ports: * 22/tcp -> SSH (OpenSSH 9.6p1) * 443/tcp -&
Introduction Cybersecurity systems increasingly rely on machine learning (ML) for anomaly detection and threat mitigation, yet current ML-based anomaly detection techniques face significant challenges. Organizations struggle with a flood of
Introduction Zero-day vulnerabilities are some of the most feared security flaws in the cyber world. A zero-day vulnerability refers to a software bug or weakness unknown to the vendor or
Introduction Social engineering has long been a cornerstone of cyberattacks – manipulating human trust to reveal information or authorize actions. In recent years, attackers have supercharged these tactics with artificial intelligence.
Introduction Ransomware has transformed from a fringe threat to a multi-billion-dollar criminal enterprise over the past decades. The cliché of a lone hacker in a dark room no longer reflects
Enterprise AI platforms are increasingly multimodal, allowing users to submit images for analysis alongside text. This trend raises critical questions about how these services process, store, and secure image data,
Introduction Modern enterprises face a deluge of cyber threats that continues to grow in scale and sophistication. In the post-GPT-3.5 era (2024–2025), defensive cybersecurity teams – the Blue Teams
Unveiling the Hidden Enchantment in malicious.h5: A Detailed Analysis Challenge: Investigate a mysterious magical artifact (malicious.h5) exhibiting unusual behavior to uncover its secrets. The flag format is HTB{
Unveiling the Hidden Payload in resnet18.pth: A Forensic Model Analysis Challenge: Analyze a corrupted magical machine learning model (resnet18.pth) from the Library of Loria, tampered with by Malakar&
Alright, let’s dive into this box, which officially sits at an intermediate level on Offsec’s Playground called "Access". But here’s the catch: the community collectively
Walkthrough of vmdak Introduction Hello everyone! I'm back with another walkthrough. This time, I tackled "VMDak," an intermediate-level Linux box from OffSec Proving Grounds. This box