HackTheBox Writeups
Detailed walkthroughs of HackTheBox machines, covering everything from initial enumeration to root/system access.
⚠️ Warning: All writeups are published only after machines have been retired from HackTheBox. Active machine writeups are prohibited and against HTB rules.
Writeup Structure
Each HackTheBox writeup follows this format:
- Machine Info: Name, OS, difficulty, and key skills
- Reconnaissance: Port scanning and service enumeration
- Initial Foothold: Web exploitation, vulnerable services, etc.
- User Flag: Techniques to gain user-level access
- Privilege Escalation: Methods to escalate to root/administrator
- Root Flag: Final exploitation and proof
- Key Takeaways: Skills and techniques learned
Categories
By Difficulty
- Easy: Great for beginners, covers fundamental concepts
- Medium: Requires multiple techniques and deeper enumeration
- Hard: Complex exploitation chains and advanced concepts
- Insane: Extremely challenging, multiple exploit chains
By OS
- Linux: Linux-based machines and privilege escalation
- Windows: Active Directory, Windows privilege escalation
- Other: FreeBSD, Solaris, and other operating systems
Coming Soon
Writeups will be added here as machines are retired. Check back regularly for new content!
HTB Profile: Coming soon
Want to suggest a retired machine to cover? Feel free to reach out!