⚠️ This box is currently active on HackTheBox. Once retired, these notes will be fully published for public access as per HackTheBox’s policy on publishing content from their platform.
Recon
What two exploits did you find?
Foothold
Did you merge them successfully and use the websocket command to get the robound Shell?
JWT exploit
We’re you able to bypass the c2 auth and create a TeamLead user?
Pivoting
Did you pivote into a new user via the web c2?
Priv esc
Hidden rules?
Did you check if iptables for unsual comments?
Got better sanity check hints? Shoot them to me -> chris@alupify.com