HackTheBox Writeups

Detailed walkthroughs of HackTheBox machines, covering everything from initial enumeration to root/system access.

⚠️ Warning: All writeups are published only after machines have been retired from HackTheBox. Active machine writeups are prohibited and against HTB rules.

Writeup Structure

Each HackTheBox writeup follows this format:

  1. Machine Info: Name, OS, difficulty, and key skills
  2. Reconnaissance: Port scanning and service enumeration
  3. Initial Foothold: Web exploitation, vulnerable services, etc.
  4. User Flag: Techniques to gain user-level access
  5. Privilege Escalation: Methods to escalate to root/administrator
  6. Root Flag: Final exploitation and proof
  7. Key Takeaways: Skills and techniques learned

Categories

By Difficulty

  • Easy: Great for beginners, covers fundamental concepts
  • Medium: Requires multiple techniques and deeper enumeration
  • Hard: Complex exploitation chains and advanced concepts
  • Insane: Extremely challenging, multiple exploit chains

By OS

  • Linux: Linux-based machines and privilege escalation
  • Windows: Active Directory, Windows privilege escalation
  • Other: FreeBSD, Solaris, and other operating systems

Coming Soon

Writeups will be added here as machines are retired. Check back regularly for new content!


HTB Profile: Coming soon

Want to suggest a retired machine to cover? Feel free to reach out!