All Writeups

The 4 way handshake Router sends a challenge: The router (or access point) sends a challenge” to […]
Using Metasploit to create a document with malicious macros Launch Metasploit use exploit/multi/fileformat/office_word_macro set payload  windows/meterpreter/reverse_tcp […]
Jeeves is not overly complicated, however it focuses on some interesting techniques and provides a great […]
Cap is an easy difficulty Linux machine running an HTTP server that performs administrative functions including […]
SecNotes is a medium difficulty machine, which highlights the risks associated with weak password change mechanisms, […]
Legacy is a fairly straightforward beginner-level machine which demonstrates the potential security risks of SMB on […]
Devel, while relatively simple, demonstrates the security risks associated with some default program configurations. It is […]
Grandpa is one of the simpler machines on Hack The Box, however it covers the widely-exploited […]
Netmon is an easy difficulty Windows box with simple enumeration and exploitation. PRTG is running, and […]