the🖊️testing.ninja

the🖊️testing.ninja

Hacking and Offensive Security Content.

HackSmarter: ShadowGate Writeup

HackSmarter: ShadowGate Writeup

Black-box Windows AD engagement against a single DC. AS-REP roasting yields initial credentials, shadow credential abuse pivots to a domain user, and ESC8 relay achieves DCSync.

in
HTB: PingPong Writeup

🔒 HTB: PingPong Writeup

Detailed writeup of Season 10 Hack The Box PingPong machine.  🔒 Protected Content

in
HTB: Redelegate Writeup

HTB: Redelegate Writeup

Hard Windows Active Directory box involving FTP enumeration, KeePass cracking, MSSQL credential abuse, ForceChangePassword ACL exploitation, and constrained delegation abuse to achieve DCSync.

in
HTB: Logging Writeup

🔒 HTB: Logging Writeup

Detailed writeup of Season 10 Hack The Box Logging machine.  🔒 Protected Content

in
HackSmarter: Samurai Writeup

HackSmarter: Samurai Writeup

Samurai is a Linux machine featuring a Joomla 4.2.5 instance vulnerable to CVE-2023-23752, leaking database credentials and sensitive information granting admin access, leading to RCE and a command injection privesc via a SUID-like custom binary.

in
HTB: Silentium Writeup

🔒 HTB: Silentium Writeup

Detailed writeup of Season 10 Hack The Box Silentium machine.  🔒 Protected Content

in
HTB: Eighteen Writeup

HTB: Eighteen Writeup

Eighteen is a Windows Server 2025 domain controller where MSSQL impersonation leads to a cracked PBKDF2 hash and a password spray foothold, then BadSuccessor dMSA abuse escalates to Domain Admin.

in
HTB: EscapeTwo Writeup

HTB: EscapeTwo Writeup

EscapeTwo is an easy Windows Active Directory machine on HackTheBox. Starting with provided credentials, we enumerate SMB shares to recover plaintext credentials from Excel files, pivot through MSSQL to a shell as sql_svc, recover ryan credentials from a SQL installer config, then abuse ESC4 via the ca_svc account to forge an administrator certificate and own the domain.

in
HTB: DarkZero Writeup

HTB: DarkZero Writeup

Hard Windows Active Directory machine featuring MSSQL linked server lateral movement across two forests, CVE-2024-30088 kernel LPE to SYSTEM, and unconstrained delegation abuse for domain takeover.

in
HTB: StreamIO Writeup

HTB: StreamIO Writeup

StreamIO is a medium Windows Active Directory box. SQL injection on a PHP login page leaks MD5 hashes, cracking them gets admin panel access, where a hidden debug parameter enables LFI and PHP source disclosure leading to RCE via eval(). Pivoting through MSSQL and Firefox saved credentials exposes an AD path through LAPS.

in
HTB: Garfield Writeup

🔒 HTB: Garfield Writeup

Detailed writeup of Season 10 Hack The Box Garfield machine.  🔒 Protected Content

in
HTB: Authority Writeup

HTB: Authority Writeup

Medium Windows Active Directory box where Ansible Vault secrets on an SMB share lead to PWM credential theft, then ESC1 ADCS abuse for domain admin.

in