Job from HackTheBox features phishing with a LibreOffice macro sent via SMTP, dropping a webshell into IIS, and abusing SeImpersonatePrivilege with GodPotato for SYSTEM.
Job from HackTheBox features phishing with a LibreOffice macro sent via SMTP, dropping a webshell into IIS, and abusing SeImpersonatePrivilege with GodPotato for SYSTEM.
Imagery from HackTheBox features XSS to steal cookies, directory traversal for source code access, and command injection for rce. Pivots include pyAesCrypt brute-forcing and abusing a sudo backup utility exploited multiple ways.
Imagery from HackTheBox features XSS to steal cookies, directory traversal for source code access, and command injection for rce. Pivots include pyAesCrypt brute-forcing and abusing a sudo backup utility exploited multiple ways.
Spent an hour in Claude Code last night and made the tables at the top of my @hackthebox.bsky.social blog posts on 0xdf.gitlab.io a bit nicer :) Feedback welcome.
January 21, 2026 at 5:44 PM
Spent an hour in Claude Code last night and made the tables at the top of my @hackthebox.bsky.social blog posts on 0xdf.gitlab.io a bit nicer :) Feedback welcome.
HackNet from HackTheBox features SSTI in Django templates to leak user credentials, pickle deserialization via FileBasedCache with world-writable directory, and GPG key cracking to recover database backups containing the root password.
HackNet from HackTheBox features SSTI in Django templates to leak user credentials, pickle deserialization via FileBasedCache with world-writable directory, and GPG key cracking to recover database backups containing the root password.
Previous from HackTheBox features CVE-2025-29927 (NextJS middleware auth bypass), directory traversal for file read, and three ways to abuse a Terraform sudo rule with !env_reset to get root.
Previous from HackTheBox features CVE-2025-29927 (NextJS middleware auth bypass), directory traversal for file read, and three ways to abuse a Terraform sudo rule with !env_reset to get root.
In the 2025 Holiday Hack Frosty tries to freeze the neighborhood. I exploited SSTI, IDOR, prompt injection, cloud misconfigs, and reversed a SkiFree clone. Wrote a TamperMonkey plugin to teleport, walk through walls, and find hidden gnomes. KringleCon
In the 2025 Holiday Hack Frosty tries to freeze the neighborhood. I exploited SSTI, IDOR, prompt injection, cloud misconfigs, and reversed a SkiFree clone. Wrote a TamperMonkey plugin to teleport, walk through walls, and find hidden gnomes. KringleCon
Had a ton of fun with Flagvent this year, and finished all 25 challenges! So many quirky interesting things. My favorite challenge was the hardware leet challenge. And I got to author two easy challenges as well.
Had a ton of fun with Flagvent this year, and finished all 25 challenges! So many quirky interesting things. My favorite challenge was the hardware leet challenge. And I got to author two easy challenges as well.
WhiteRabbit from HackTheBox targets a pentester's infra with Uptime Kuma enumeration, n8n webhook SQL injection via HMAC-signed requests, restic backup recovery, and reversing a time-seeded password generator for privilege escalation.
WhiteRabbit from HackTheBox targets a pentester's infra with Uptime Kuma enumeration, n8n webhook SQL injection via HMAC-signed requests, restic backup recovery, and reversing a time-seeded password generator for privilege escalation.
#AdventOfCode Day 12 involves fitting presents in space under a tree. The problem for all solutions is either hard or impossible. I'll find a shortcut looking at the data and the space required for each tree. Claude gets the answer without recognizing it.
#AdventOfCode Day 12 involves fitting presents in space under a tree. The problem for all solutions is either hard or impossible. I'll find a shortcut looking at the data and the space required for each tree. Claude gets the answer without recognizing it.
#AdventOfCode Day 10 involves binary xor and linear equations. Claude tries an unfiesable long solution first when he thinks he can't use packages. When I tell him how to use packages, he uses scipy to solve quickly.
#AdventOfCode Day 10 involves binary xor and linear equations. Claude tries an unfiesable long solution first when he thinks he can't use packages. When I tell him how to use packages, he uses scipy to solve quickly.
#AdventOfCode Day9 is a beast. I'll have to find squares inside a large polygon defined by almost 500 points. I'll use ray finding and edge crossing to solve it. Claude tries an unfiesable long solution first, then gets it.
#AdventOfCode Day9 is a beast. I'll have to find squares inside a large polygon defined by almost 500 points. I'll use ray finding and edge crossing to solve it. Claude tries an unfiesable long solution first, then gets it.
#AdventOfCode Day8 showcases a union find technique to track and merge sets of points in 3D space. Claude does basically the exactly same thing I did :)
#AdventOfCode Day8 showcases a union find technique to track and merge sets of points in 3D space. Claude does basically the exactly same thing I did :)
#AdventOfCode Day7 is about tracking a beam down a space as it hits things that split it into two. In part 1 I'll count the number of splits for a beam, and in part two the number of paths a particle could take choosing left or right at each split.
#AdventOfCode Day7 is about tracking a beam down a space as it hits things that split it into two. In part 1 I'll count the number of splits for a beam, and in part two the number of paths a particle could take choosing left or right at each split.
Editor from HackTheBox features unauthenticated Groovy script injection in XWiki's Solr search for RCE, password reuse from the Hibernate config, and PATH injection in NetData's ndsudo SetUID binary for root.
Editor from HackTheBox features unauthenticated Groovy script injection in XWiki's Solr search for RCE, password reuse from the Hibernate config, and PATH injection in NetData's ndsudo SetUID binary for root.
#AdventOfCode Day6 is all about handling columns of data. In part 1, I'll combine columns of ints. In part 2, I'll build the ints from columns of characters. Claude nails it quickly, but with some verbose ugly code.
#AdventOfCode Day6 is all about handling columns of data. In part 1, I'll combine columns of ints. In part 2, I'll build the ints from columns of characters. Claude nails it quickly, but with some verbose ugly code.
#AdventOfCode Day4 is the first grid challenge of the year. I'll count spaces with no more than 3 filled neighbors. In part 2, I'll iterate to remove those spaces and check again until I've removed all that can be removed.
#AdventOfCode Day4 is the first grid challenge of the year. I'll count spaces with no more than 3 filled neighbors. In part 2, I'll iterate to remove those spaces and check again until I've removed all that can be removed.
#AdventOfCode Day3 is all about finding the largest int possible from a string by selecting n digits without changing the order. Claude went for a super long running solution today, but after I told it to find a better one, it solved quickly.
#AdventOfCode Day3 is all about finding the largest int possible from a string by selecting n digits without changing the order. Claude went for a super long running solution today, but after I told it to find a better one, it solved quickly.
#AdventOfCode Day2 video is up! I'll compare using string operations and regex for part 1, and then regex makes part 2 trivial. Claude solves it just using string comparisons.
#AdventOfCode Day2 video is up! I'll compare using string operations and regex for part 1, and then regex makes part 2 trivial. Claude solves it just using string comparisons.
#AdventOfCode Day1 video released yesterday! Part 1 is pretty straight forward using modulo to track a dial as it spins around 0-99. Part 2 is a bit trickier, with some edge cases to take into account.
#AdventOfCode Day1 video released yesterday! Part 1 is pretty straight forward using modulo to track a dial as it spins around 0-99. Part 2 is a bit trickier, with some edge cases to take into account.
Holiday CTFs are here! Intro video about Advent of Code and my approach this year. (And check out https://flagvent.org/ and the Sans Holiday Hack as well).
Holiday CTFs are here! Intro video about Advent of Code and my approach this year. (And check out https://flagvent.org/ and the Sans Holiday Hack as well).
Era from HackTheBox has multiple IDOR vulnerabilities followed by a PHP injection invoking the PHP SSH module to run commands on the host. Then there's a signed Linux binary to negotiate for root.
Era from HackTheBox has multiple IDOR vulnerabilities followed by a PHP injection invoking the PHP SSH module to run commands on the host. Then there's a signed Linux binary to negotiate for root.
Mirage from HackTheBox is an Active Directory box with NATS, NFS, Kerberoasting, cross-session relay, account enabling and fixing logonHours, and ESC10.
Mirage from HackTheBox is an Active Directory box with NATS, NFS, Kerberoasting, cross-session relay, account enabling and fixing logonHours, and ESC10.