#hackTheBox

Got Root :hispagatos: # :idle:rek2@hispagatos.space
2025-06-20

Today I had time finally to work & to merge my changes to my #HTB #HackTheBox #CTF support tool
to help start a new box and the starting information gathering and
reconnaissance. git.sr.ht/~rek2/rek2htb-rust #hackingIsNotACrime
#hackerCulture #hackers #hacking hackingisnotacrime.org

2025-06-19

HTB Academy — Getting Started — Knowledge Check (Проверка знаний)

Внимание!!! В статье показано пошаговое решение модуля Getting Started. Я настоятельно рекомендую сначала попробовать решить задачу самостоятельно, а в случае затруднений обратиться к подробному пошаговому руководству. Это позволит вам лучше понять процесс и развить собственные навыки. Также вы можете изучить различные подходы к решению и логику мышления. Я такой же, как и вы, начинающий специалист в сфере пентеста. Не судите слишком строго! Задание: 1. Создайте цель, закрепитесь и отправьте содержимое флага user.txt. 2. После получения доступа к цели, повышайте привилегии, чтобы укорениться и представить содержимое флага root.txt.

habr.com/ru/articles/919784/

#hackthebox #academy

Wen Bin :verified:kongwenbin@infosec.exchange
2025-06-10

🚨 Want to start learning ethical web hacking for FREE?

🎯 In this video, I break down 3 websites that offer hands-on labs, structured paths, and gamified learning - perfect for beginners in web application penetration testing and bug bounty!

🎓 Here’s who made the list:

✅ PortSwigger Web Security Academy
Learn real-world web vulnerabilities with interactive labs

✅ TryHackMe
Gamified challenges + guided learning paths

✅ Hack The Box
Academy modules, practice labs & certifications — all linked together

But I didn’t stop at listing them.

💡 I shared my professional take on:
1️⃣ Their unique strengths
2️⃣ What makes each platform great for beginners
3️⃣ And where they could improve to become even better

This isn't just another list — they are insights from an active bug bounty hunter from Singapore 🇸🇬😊

📺 Watch here: youtube.com/watch?v=_LrpMiAD8rg
📌 Timestamps and useful links in the video description

👇 Comment your favorite FREE hacking resources — let's share and help each other grow!

#BugBounty #BugBountyTips #CyberSecurity #EthicalHacking #TryHackMe #HackTheBox #PortSwigger

Ivan Ožić Bebekobivan@infosec.exchange
2025-06-08

Took me almost 4 months, but a new let‘s #hackthebox video is finally out

Ivan Ožić Bebekobivan@infosec.exchange
2025-06-01
2025-05-30

Day 1 of posting to social media until I get an offensive security research job

First, I’m going to start with what I know – Windows. I need to recreate what I had access to at Microsoft, so that starts by setting up a dev environment and finding a copy of Windows System Internals, perhaps the greatest resource for learning Windows out there. My expertise is in Windows and virtualization, so I’m going to make sure I master those areas.

Next, I don’t think I want to grind coding exercises, but I do need to shake the rust off my coding skills. I think I’m going to start with some HackTheBox challenges and find some CTFs to participate in.

Finally, my long overdue goal: learn Rust. I’m not sure if this will help immediately, as I could choose to improve my knowledge of Python. But Rust was getting more and more popular in the areas of Windows I was tasked with protecting, so I need to learn what all the fuss is about with regards to memory safety.

If anyone is on a similar journey, let’s hold each other accountable in the comments! I will be sure to document any write-ups at blog.maxrenke.com (work in progress).

#OffensiveSecurity #CyberSecurity #WindowsInternals #HackTheBox #CTF #EthicalHacking #RedTeam #BlueTeam #RustLang #PythonProgramming #DevEnvironment #InfoSec #CyberCareer #SecurityResearch #MemorySafety #CyberCommunity #JobSearch #TechJourney #SecurityEngineering #Pentesting #LearningEveryDay

Ivan Ožić Bebekobivan@infosec.exchange
2025-05-17
J0eJ0ej0ej0e
2025-05-12

Just owned GoodGames on HTB!

Bit of a tricky one, and definitely opened my eyes to techniques I haven't learned/ flat out forgot :)

hackthebox.com/achievement/mac

Ivan Ožić Bebekobivan@infosec.exchange
2025-05-11
Got Root :hispagatos: # :idle:rek2@hispagatos.space
2025-05-02

before heading out 2 the #2600 #meeting in #madrid worked on my #gemini #gemlog
& on the #http output rek2.hispagatos.org & gemini://rek2.hispagatos.org
still a lot of work to do also started something I been wanting to do for years
is attach a sub-blog only of #hacking and #CTF topics like #writeups and such I
created it under rek2.hispagatos.org/writeups/ & added 2 test writeups
I did last year of #hackthebox 200+ more 2 come & good
#hacking info & tricks <3
#HappyHacking #HackingIsNotACrime

maschmiinw
2025-04-29

Last weekend I saw an opening to try another easy machine on . This time I had a try on Nocturnal. Today, I finally finished it. And what shall I say: those exercises really humble me. I cannot count the times I just overlooked something simple, or decided to not research what these funny things are that are running on the machine, or really check which ports are used.

Maybe I should not do stuff like this after a workday or I need way more discipline. But as long as it is fun...

Ivan Ožić Bebekobivan@infosec.exchange
2025-04-26
Rorroh Snowcat :verified:Rorroh@mstdn.social
2025-04-23

Looks like the MagicGardens machine from #HackTheBox retired when I wasn't looking. That means I finally get to publish my writeup! Very excited about this one, check it out!
rorroh.net/post/hack-the-box-m

#HTB #CyberSecurity

2025-04-23

Quisiera darle las gracias a la team de #hackthebox que me ha ayudado a recuperar mi cuentecita, yo siendo un un gran n00b la habia perdido por mandar #protonmail a hacer gargaras despues de un gran cabreo.

Asi se aprende.

2025-04-12

🔎 MisCloud is just retired! Walkthrough disclosure - right from the clouds 😶‍🌫️

🔸 Google Cloud Services logs
🔸 Intense PCAP analysis
🔸 Really nice real-life scenario

🔗 blog.cyberethical.me/htb-sherl

Want to try investigations yourself?

🔗 blog.cyberethical.me/go-htbapp

#CyberEthical #HackTheBox #forensics #EthicalHacking #blueteaming #itsec #dataexfiltration #googlecloudservices #gcs #pcap #wireshark

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst