<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>HTB: HackTheBox Season 10 on Security Writeups | HackTheBox | Wiz CTF | AWS Cloud Security | CVE Analysis | Arbaaz Jamadar</title>
    <link>https://arbaazjamadar.com/htb/</link><description>Recent content in HTB: HackTheBox Season 10  on Security Writeups | HackTheBox | Wiz CTF | AWS Cloud Security | CVE Analysis | Arbaaz Jamadar</description>

    <generator>Hugo -- gohugo.io</generator>
    <language>en</language><managingEditor>reachout@arbaazjamadar.com (Arbaaz Jamadar)</managingEditor>
      <webMaster>reachout@arbaazjamadar.com (Arbaaz Jamadar)</webMaster><copyright>©2025 arbaazjamadar.com</copyright><lastBuildDate>Sun, 19 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://arbaazjamadar.com/htb/rss.xml" rel="self" type="application/rss+xml" /><item>
        <title>HackTheBox: Logging</title>
        <link>https://arbaazjamadar.com/htb/hackthebox-logging/</link>
        <pubDate>Sun, 19 Apr 2026 00:00:00 +0000</pubDate>
        <author>reachout@arbaazjamadar.com (Arbaaz Jamadar)</author>
        <guid isPermaLink="true">https://arbaazjamadar.com/htb/hackthebox-logging/</guid>

        <description>Unauthenticated Enumeration, generate ticket using the found creds. Abuse shadow credential to reset msa_health and get initial foothold. Lateral movement through dll injection and privilege escalation via AD CS (ESC1) and WSUS abuse.</description><category domain="tags">Security</category><category domain="tags">Security Writeup</category><category domain="tags">Cloud Security</category><category domain="tags">HTB writeup</category><category domain="tags">HTB Logging writeup</category><category domain="tags">Logging Writeup</category><category domain="tags">security writeup</category><category domain="tags">HTB</category><category domain="tags">Logging</category><category domain="tags">Windows</category><category domain="tags">Active Directory</category><category domain="tags">dll hijacking</category><category domain="tags">UpdateMonitor</category><category domain="tags">service abuse</category><category domain="tags">privilege escalation</category><category domain="tags">tgt</category><category domain="tags">Misconfigurations</category><category domain="tags">flowai</category><category domain="tags">password reset</category><category domain="tags">Lateral Pivoting</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: Logging</category><category domain="tags">HTB: Logging</category><category domain="tags">Information Gathering</category><category domain="tags">Initial Enumeration</category><category domain="tags">ADIDNS</category><category domain="tags">Privilege Escalation</category><category domain="tags">WSUS</category><category domain="tags">Privilege Abuse</category><category domain="tags">ADCS ESC1</category><category domain="tags">ADCS</category><category domain="tags">WSUS Abuse</category><category domain="categories">Box Writeups</category><category domain="categories">Cloud Security</category><category domain="categories">Network Security</category><category domain="categories">Web Security</category><category domain="categories">Browsed Security</category><category domain="categories">API Security</category></item><item>
        <title>HackTheBox: Silentium</title>
        <link>https://arbaazjamadar.com/htb/hackthebox-silentium/</link>
        <pubDate>Sat, 11 Apr 2026 00:00:00 +0000</pubDate>
        <author>reachout@arbaazjamadar.com (Arbaaz Jamadar)</author>
        <guid isPermaLink="true">https://arbaazjamadar.com/htb/hackthebox-silentium/</guid>

        <description>Unauathorized account takeover, leading to RCE in FLOWISEAI, reused passwords, insecure password storage. Arbitrary write using symlinks and PUT operation.</description><category domain="tags">Security</category><category domain="tags">Security Writeup</category><category domain="tags">Cloud Security</category><category domain="tags">HTB writeup</category><category domain="tags">HTB silentium writeup</category><category domain="tags">silentium Writeup</category><category domain="tags">Misconfigurations</category><category domain="tags">security writeup</category><category domain="tags">HTB</category><category domain="tags">silentium</category><category domain="tags">linux</category><category domain="tags">docker</category><category domain="tags">git</category><category domain="tags">symlinks</category><category domain="tags">service abuse</category><category domain="tags">privilege escalation</category><category domain="tags">gogs</category><category domain="tags">flowai</category><category domain="tags">password reset</category><category domain="tags">Lateral Pivoting</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: silentium</category><category domain="tags">HTB: silentium</category><category domain="tags">Information Gathering</category><category domain="tags">Initial Enumeration</category><category domain="tags">subdomain</category><category domain="tags">Privilege Escalation</category><category domain="tags">nginx</category><category domain="tags">Privilege Abuse</category><category domain="tags">CVE-2025-59528</category><category domain="tags">CVE-2025-58434</category><category domain="tags">CVE-2025-64111</category><category domain="categories">Box Writeups</category><category domain="categories">Cloud Security</category><category domain="categories">Network Security</category><category domain="categories">Web Security</category><category domain="categories">Browsed Security</category><category domain="categories">API Security</category></item><item>
        <title>HackTheBox: Garfield</title>
        <link>https://arbaazjamadar.com/htb/hackthebox-garfield/</link>
        <pubDate>Mon, 06 Apr 2026 00:00:00 +0000</pubDate>
        <author>reachout@arbaazjamadar.com (Arbaaz Jamadar)</author>
        <guid isPermaLink="true">https://arbaazjamadar.com/htb/hackthebox-garfield/</guid>

        <description>Initial Foothold via batch script, abusing ForceChangePassword privilege to move laterally. Ligolo to pivot to RODC, Domain compromise via RODC Keylist Abuse.</description><category domain="tags">Security</category><category domain="tags">Security Writeup</category><category domain="tags">Cloud Security</category><category domain="tags">HTB writeup</category><category domain="tags">HTB Garfield writeup</category><category domain="tags">Garfield Writeup</category><category domain="tags">Misconfigurations</category><category domain="tags">security writeup</category><category domain="tags">HTB</category><category domain="tags">Garfield</category><category domain="tags">Windows</category><category domain="tags">Active Directory</category><category domain="tags">Golden Ticket</category><category domain="tags">rbcd</category><category domain="tags">rbcd abuse</category><category domain="tags">rodc</category><category domain="tags">ForceChangePassword</category><category domain="tags">RODC KeyList</category><category domain="tags">Keylist attack</category><category domain="tags">Lateral Pivoting</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: Garfield</category><category domain="tags">HTB: Garfield</category><category domain="tags">Information Gathering</category><category domain="tags">Initial Enumeration</category><category domain="tags">msDS-RevealOnDemandGroup</category><category domain="tags">Privilege Escalation</category><category domain="tags">BloodyAD</category><category domain="tags">BloodHound</category><category domain="tags">Privilege Abuse</category><category domain="categories">Box Writeups</category><category domain="categories">Cloud Security</category><category domain="categories">Network Security</category><category domain="categories">Web Security</category><category domain="categories">Browsed Security</category><category domain="categories">API Security</category></item><item>
        <title>HackTheBox: devarea</title>
        <link>https://arbaazjamadar.com/htb/hackthebox-devarea/</link>
        <pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate>
        <author>reachout@arbaazjamadar.com (Arbaaz Jamadar)</author>
        <guid isPermaLink="true">https://arbaazjamadar.com/htb/hackthebox-devarea/</guid>

        <description>Initial foothold by leaking credentials using SSRF from Apache CXF, and using creds to execute RCE on Hoverfly dashboard. Privilege escalation via, exploiting the world writable bash and executing the syswatch script.</description><category domain="tags">Security</category><category domain="tags">Security Writeup</category><category domain="tags">Cloud Security</category><category domain="tags">HTB writeup</category><category domain="tags">HTB devarea writeup</category><category domain="tags">devarea Writeup</category><category domain="tags">apache cxf</category><category domain="tags">cxf</category><category domain="tags">syswatch</category><category domain="tags">world writable bash</category><category domain="tags">hoverfly</category><category domain="tags">hoverfly rce</category><category domain="tags">ssrf</category><category domain="tags">file wrapper</category><category domain="tags">command injection</category><category domain="tags">Misconfigurations</category><category domain="tags">security writeup</category><category domain="tags">HTB</category><category domain="tags">devarea</category><category domain="tags">linux</category><category domain="tags">Lateral Pivoting</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: devarea</category><category domain="tags">HTB: devarea</category><category domain="tags">Information Gathering</category><category domain="tags">Initial Enumeration</category><category domain="tags">Privilege Escalation</category><category domain="tags">Privilege Abuse</category><category domain="categories">Box Writeups</category><category domain="categories">Cloud Security</category><category domain="categories">Network Security</category><category domain="categories">Web Security</category><category domain="categories">Browsed Security</category><category domain="categories">API Security</category></item><item>
        <title>HackTheBox: kobold</title>
        <link>https://arbaazjamadar.com/htb/hackthebox-kobold/</link>
        <pubDate>Sat, 21 Mar 2026 00:00:00 +0000</pubDate>
        <author>reachout@arbaazjamadar.com (Arbaaz Jamadar)</author>
        <guid isPermaLink="true">https://arbaazjamadar.com/htb/hackthebox-kobold/</guid>

        <description>Initial Foothold via MCPJam RCE, LFI2RCE via privatebin resulting in compromise of stored credentials.Privilege escalation via Arcane container Orchaestration platform.</description><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">Cloud Security</category><category domain="tags">Misconfigurations</category><category domain="tags">security writeup</category><category domain="tags">HTB</category><category domain="tags">kobold</category><category domain="tags">linux</category><category domain="tags">arcane</category><category domain="tags">privatebin</category><category domain="tags">mcpjam</category><category domain="tags">MotionEye</category><category domain="tags">SQLi Data Leak</category><category domain="tags">Vulnerable Binary</category><category domain="tags">Command Injection</category><category domain="tags">Lateral Pivoting</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: kobold</category><category domain="tags">HTB: kobold</category><category domain="tags">Information Gathering</category><category domain="tags">Initial Enumeration</category><category domain="tags">reversing</category><category domain="tags">Privilege Escalation</category><category domain="tags">CVE-2026-23744</category><category domain="tags">CVE-2025-64714</category><category domain="categories">CTF Writeups</category><category domain="categories">Cloud Security</category><category domain="categories">Network Security</category><category domain="categories">Web Security</category><category domain="categories">Browsed Security</category><category domain="categories">API Security</category></item><item>
        <title>HackTheBox: VariaType</title>
        <link>https://arbaazjamadar.com/htb/hackthebox-variatype/</link>
        <pubDate>Sat, 14 Mar 2026 00:00:00 +0000</pubDate>
        <author>reachout@arbaazjamadar.com (Arbaaz Jamadar)</author>
        <guid isPermaLink="true">https://arbaazjamadar.com/htb/hackthebox-variatype/</guid>

        <description>Initial access via LFI2RCE, lateral movement via cronjob and privilege escalation via vulnerable binary</description><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">Cloud Security</category><category domain="tags">Misconfigurations</category><category domain="tags">security CTF writeup</category><category domain="tags">HTB</category><category domain="tags">variatype</category><category domain="tags">nxc</category><category domain="tags">linux</category><category domain="tags">fonttools</category><category domain="tags">cronjob</category><category domain="tags">fontforge</category><category domain="tags">setuptools</category><category domain="tags">Command Injection</category><category domain="tags">Lateral Pivoting</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: VariaType</category><category domain="tags">HTB: VariaType</category><category domain="tags">Information Gathering</category><category domain="tags">Initial Enumeration</category><category domain="tags">reversing</category><category domain="categories">CTF Writeups</category><category domain="categories">Cloud Security</category><category domain="categories">Network Security</category><category domain="categories">Web Security</category><category domain="categories">Browsed Security</category><category domain="categories">API Security</category></item><item>
        <title>HackTheBox: cctv</title>
        <link>https://arbaazjamadar.com/htb/hackthebox-cctv/</link>
        <pubDate>Sat, 07 Mar 2026 00:00:00 +0000</pubDate>
        <author>reachout@arbaazjamadar.com (Arbaaz Jamadar)</author>
        <guid isPermaLink="true">https://arbaazjamadar.com/htb/hackthebox-cctv/</guid>

        <description>Data Leak via authenticated SQLi leading to initial foothold, Privileges were escalated using RCE via motionEye running as a superuser.</description><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">Cloud Security</category><category domain="tags">Misconfigurations</category><category domain="tags">security writeup</category><category domain="tags">HTB</category><category domain="tags">cctv</category><category domain="tags">linux</category><category domain="tags">zoneminder</category><category domain="tags">MotionEye</category><category domain="tags">SQLi Data Leak</category><category domain="tags">Vulnerable Binary</category><category domain="tags">Command Injection</category><category domain="tags">Lateral Pivoting</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: cctv</category><category domain="tags">HTB: cctv</category><category domain="tags">Information Gathering</category><category domain="tags">Initial Enumeration</category><category domain="tags">reversing</category><category domain="tags">Privilege Escalation</category><category domain="categories">CTF Writeups</category><category domain="categories">Cloud Security</category><category domain="categories">Network Security</category><category domain="categories">Web Security</category><category domain="categories">Browsed Security</category><category domain="categories">API Security</category></item><item>
        <title>HackTheBox: pirate</title>
        <link>https://arbaazjamadar.com/htb/hackthebox-pirate/</link>
        <pubDate>Mon, 02 Mar 2026 00:00:00 +0000</pubDate>
        <author>reachout@arbaazjamadar.com (Arbaaz Jamadar)</author>
        <guid isPermaLink="true">https://arbaazjamadar.com/htb/hackthebox-pirate/</guid>

        <description>To do later</description><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">Cloud Security</category><category domain="tags">Misconfigurations</category><category domain="tags">security writeup</category><category domain="tags">HTB</category><category domain="tags">pirate</category><category domain="tags">windows</category><category domain="tags">Active Directory</category><category domain="tags">Assumed Breach</category><category domain="tags">Pre2k</category><category domain="tags">gMSA</category><category domain="tags">NTLM relay</category><category domain="tags">Coerce</category><category domain="tags">Delagation</category><category domain="tags">SPN Jacking</category><category domain="tags">Constrained Delegation</category><category domain="tags">Lateral Pivoting</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: pirate</category><category domain="tags">HTB: pirate</category><category domain="tags">Information Gathering</category><category domain="tags">Initial Enumeration</category><category domain="tags">reversing</category><category domain="tags">Privilege Escalation</category><category domain="categories">CTF Writeups</category><category domain="categories">Cloud Security</category><category domain="categories">Network Security</category><category domain="categories">Web Security</category><category domain="categories">Browsed Security</category><category domain="categories">API Security</category></item><item>
        <title>HackTheBox: interpreter</title>
        <link>https://arbaazjamadar.com/htb/hackthebox-interpreter/</link>
        <pubDate>Sun, 22 Feb 2026 00:00:00 +0000</pubDate>
        <author>reachout@arbaazjamadar.com (Arbaaz Jamadar)</author>
        <guid isPermaLink="true">https://arbaazjamadar.com/htb/hackthebox-interpreter/</guid>

        <description>Initial Foothold via Mirth Connect RCE moving laterally by craacking the user hash from db. Privilege escalation via XXE.</description><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">Cloud Security</category><category domain="tags">Misconfigurations</category><category domain="tags">security writeup</category><category domain="tags">HTB</category><category domain="tags">interpreter</category><category domain="tags">linux</category><category domain="tags">mirth connect</category><category domain="tags">MotionEye</category><category domain="tags">SQLi Data Leak</category><category domain="tags">Vulnerable Binary</category><category domain="tags">Command Injection</category><category domain="tags">Lateral Pivoting</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: interpreter</category><category domain="tags">HTB: interpreter</category><category domain="tags">Information Gathering</category><category domain="tags">Initial Enumeration</category><category domain="tags">reversing</category><category domain="tags">Privilege Escalation</category><category domain="tags">CVE-2023-43208</category><category domain="tags">CVE-2023-37679</category><category domain="categories">CTF Writeups</category><category domain="categories">Cloud Security</category><category domain="categories">Network Security</category><category domain="categories">Web Security</category><category domain="categories">Browsed Security</category><category domain="categories">API Security</category></item><item>
        <title>HackTheBox: wingdata</title>
        <link>https://arbaazjamadar.com/htb/hackthebox-wingdata/</link>
        <pubDate>Sun, 15 Feb 2026 00:00:00 +0000</pubDate>
        <author>reachout@arbaazjamadar.com (Arbaaz Jamadar)</author>
        <guid isPermaLink="true">https://arbaazjamadar.com/htb/hackthebox-wingdata/</guid>

        <description>Initial foothold via unauthenticated RCE on WingData, lateral movement via cracking user password from DB. Privilege Escalation via tarslip, soft link, hard link and filter bypass.</description><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">Cloud Security</category><category domain="tags">Misconfigurations</category><category domain="tags">security writeup</category><category domain="tags">HTB</category><category domain="tags">wingdata</category><category domain="tags">Linux</category><category domain="tags">tarslip</category><category domain="tags">filter bypass</category><category domain="tags">Unauthenticated RCE</category><category domain="tags">WingFTP</category><category domain="tags">RCE</category><category domain="tags">Lateral Pivoting</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: wingdata</category><category domain="tags">HTB: wingdata</category><category domain="tags">Information Gathering</category><category domain="tags">Initial Enumeration</category><category domain="tags">reversing</category><category domain="tags">Privilege Escalation</category><category domain="categories">CTF Writeups</category><category domain="categories">Cloud Security</category><category domain="categories">Network Security</category><category domain="categories">Web Security</category><category domain="categories">Browsed Security</category><category domain="categories">API Security</category></item><item>
        <title>HackTheBox: Pterodactyl</title>
        <link>https://arbaazjamadar.com/htb/hackthebox-pterodactyl/</link>
        <pubDate>Sun, 08 Feb 2026 00:00:00 +0000</pubDate>
        <author>reachout@arbaazjamadar.com (Arbaaz Jamadar)</author>
        <guid isPermaLink="true">https://arbaazjamadar.com/htb/hackthebox-pterodactyl/</guid>

        <description>Problem of future arbaaz</description><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">Cloud Security</category><category domain="tags">Misconfigurations</category><category domain="tags">security writeup</category><category domain="tags">HTB</category><category domain="tags">Pterodactyl</category><category domain="tags">Linux</category><category domain="tags">PAM</category><category domain="tags">PHP PearCMD</category><category domain="tags">Unauthenticated RCE</category><category domain="tags">Suse</category><category domain="tags">RCE</category><category domain="tags">udisks</category><category domain="tags">race condition</category><category domain="tags">Lateral Pivoting</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: Pterodactyl</category><category domain="tags">HTB: Pterodactyl</category><category domain="tags">Information Gathering</category><category domain="tags">Initial Enumeration</category><category domain="tags">reversing</category><category domain="tags">Privilege Escalation</category><category domain="tags">CVE-2025-6018</category><category domain="tags">CVE-2025-6019</category><category domain="categories">CTF Writeups</category><category domain="categories">Cloud Security</category><category domain="categories">Network Security</category><category domain="categories">Web Security</category><category domain="categories">Browsed Security</category><category domain="categories">API Security</category></item><item>
        <title>HackTheBox: Facts</title>
        <link>https://arbaazjamadar.com/htb/hackthebox-facts/</link>
        <pubDate>Sun, 01 Feb 2026 00:00:00 +0000</pubDate>
        <author>reachout@arbaazjamadar.com (Arbaaz Jamadar)</author>
        <guid isPermaLink="true">https://arbaazjamadar.com/htb/hackthebox-facts/</guid>

        <description>Improperly Controlled Modification of Dynamically-Determined Object Attributes allows privilege escalation to admin user leading to exfiltrating SSH keys from S3 Bucket and getting become the Root user by privilege escalation via misconfigured SUID</description><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">Cloud Security</category><category domain="tags">Misconfigurations</category><category domain="tags">security writeup</category><category domain="tags">HTB</category><category domain="tags">facts</category><category domain="tags">linux</category><category domain="tags">cameleon cms</category><category domain="tags">Mass Assignment</category><category domain="tags">S3 Data Leak</category><category domain="tags">Misconfigured SUID</category><category domain="tags">Command Injection</category><category domain="tags">Lateral Pivoting</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: facts</category><category domain="tags">HTB: facts</category><category domain="tags">Information Gathering</category><category domain="tags">Initial Enumeration</category><category domain="tags">reversing</category><category domain="tags">Privilege Escalation</category><category domain="categories">CTF Writeups</category><category domain="categories">Cloud Security</category><category domain="categories">Network Security</category><category domain="categories">Web Security</category><category domain="categories">Browsed Security</category><category domain="categories">API Security</category></item>
  </channel>
</rss>
