HtB Celestial
Celestial is a medium difficulty machine which focuses on deserialization exploits. It is not the most realistic, however it provides a practical example of abusing client-size serialized objects in NodeJS framework.
Celestial is a medium difficulty machine which focuses on deserialization exploits. It is not the most realistic, however it provides a practical example of abusing client-size serialized objects in NodeJS framework.
Zipper is a medium difficulty machine that highlights how privileged API access can be leveraged to gain RCE, and the risk of unauthenticated agent access. It also provides an interesting challenge in terms of overcoming command processing timeouts, and also highlights the dangers of not specifying absolute paths in privileged admin scripts/binaries.
Monitors is a hard Linux machine that involves WordPress plugin
exploitation leading to a command injection
via SQL injection
through a well known network management web application in order to get a shell on the system. Then by performing basic service file enumeration one can gain the user password and thus a foothold to the system through SSH. The root stage consists of a Java based XML RPC deserialization
attack against Apache OFBiz
to gain a shell in a Docker container. Then it is possible by abusing the CAP_SYS_MODULE
capability to load a malicious kernel module against the host and escalate privileges to root.
JSON is a medium difficulty Windows machine running an IIS server with an ASP.NET application. The application is found to be vulnerable to .NET deserialization, which is exploited using ysoserial.net. A custom .NET program is found to be installed, which on reverse engineering reveals encrypted credentials for an administrator. These credentials can be decrypted and used to gain access to the FTP folder.
In an era where cyber threats dominate headlines, physical security is often overlooked. However, one of the most effective tools in an attacker’s arsenal isn’t a zero-day exploit or advanced malware—it’s human nature. More specifically, it’s the natural inclination of employees to be courteous. This well-intentioned trait, while essential for a healthy work culture, can become a serious liability when it comes to security.
Sizzle is an Insane difficulty WIndows box with an Active Directory environment. A writable directory in an SMB share allows to steal NTLM hashes which can be cracked to access the Certificate Services Portal. A self signed certificate can be created using the CA and used for PSRemoting. A SPN associated with a user allows a kerberoast attack on the box. The user is found to have Replication rights which can be abused to get Administrator hashes via DCSync.
Vault is medium to hard difficulty machine, which requires bypassing host and file upload restrictions, tunneling, creating malicious OpenVPN configuration files and PGP decryption.
Popcorn, while not overly complicated, contains quite a bit of content and it can be difficult for some users to locate the proper attack vector at first. This machine mainly focuses on different methods of web exploitation.
Sightless
is an easy-difficulty Linux machine featuring a website for a company offering various services. Enumeration of the website reveals an SQLPad
instance vulnerable to template injection CVE-2022-0944, which is leveraged to gain a foothold inside a Docker container. Further enumeration reveals the /etc/shadow
file with a password hash, which is cracked to reveal the password, granting SSH
access to the host. Post-exploitation enumeration reveals a Froxlor
instance vulnerable to Blind XSS
CVE-2024-34070. This is leveraged to gain access to the FTP
service, which contains a KeePass
database. Accessing the database reveals the root SSH
keys, leading to a privileged shell on the host.
Cicada is an easy-difficult Windows machine that focuses on beginner Active Directory enumeration and exploitation. In this machine, players will enumerate the domain, identify users, navigate shares, uncover plaintext passwords stored in files, execute a password spray, and use the SeBackupPrivilege
to achieve full system compromise.