<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <title>hg8&#39;s Notes — My notes about infosec world. Pentest/Bug Bounty/CTF Writeups.</title>
  <icon>https://hg8.sh/icon.png</icon>
  
  <link href="https://hg8.sh/atom.xml" rel="self"/>
  
  <link href="https://hg8.sh/"/>
  <updated>2025-12-28T17:19:16.219Z</updated>
  <id>https://hg8.sh/</id>
  
  <author>
    <name>hg8</name>
    
  </author>
  
  <generator uri="https://hexo.io/">Hexo</generator>
  
  <entry>
    <title>HackTheBox - White Rabbit</title>
    <link href="https://hg8.sh/posts/whiterabbit/"/>
    <id>https://hg8.sh/posts/whiterabbit/</id>
    <published>2025-12-12T23:00:00.000Z</published>
    <updated>2025-12-28T17:19:16.219Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;img width=&quot;578&quot; alt=&quot;whiterabbit-hackthebox&quot; src=&quot;/images/whiterabbit/WhiteRabbit.png&quot;&gt;

&lt;p&gt;White Rabbit just retired on HackTheBox. This</summary>
        
      
    
    
    
    <category term="CTF" scheme="https://hg8.sh/categories/CTF/"/>
    
    <category term="HackTheBox" scheme="https://hg8.sh/categories/CTF/HackTheBox/"/>
    
    <category term="Insane Box" scheme="https://hg8.sh/categories/CTF/HackTheBox/Insane-Box/"/>
    
    
    <category term="linux" scheme="https://hg8.sh/tags/linux/"/>
    
    <category term="python" scheme="https://hg8.sh/tags/python/"/>
    
    <category term="docker" scheme="https://hg8.sh/tags/docker/"/>
    
    <category term="ctf" scheme="https://hg8.sh/tags/ctf/"/>
    
    <category term="writeup" scheme="https://hg8.sh/tags/writeup/"/>
    
    <category term="sqlmap" scheme="https://hg8.sh/tags/sqlmap/"/>
    
    <category term="restic" scheme="https://hg8.sh/tags/restic/"/>
    
    <category term="hydra" scheme="https://hg8.sh/tags/hydra/"/>
    
    <category term="whiterabbit" scheme="https://hg8.sh/tags/whiterabbit/"/>
    
    <category term="hackthebox" scheme="https://hg8.sh/tags/hackthebox/"/>
    
    <category term="privilege escalation" scheme="https://hg8.sh/tags/privilege-escalation/"/>
    
    <category term="insane" scheme="https://hg8.sh/tags/insane/"/>
    
    <category term="sql injection" scheme="https://hg8.sh/tags/sql-injection/"/>
    
    <category term="hmac" scheme="https://hg8.sh/tags/hmac/"/>
    
    <category term="reversing" scheme="https://hg8.sh/tags/reversing/"/>
    
    <category term="predictable prng" scheme="https://hg8.sh/tags/predictable-prng/"/>
    
    <category term="container escape" scheme="https://hg8.sh/tags/container-escape/"/>
    
    <category term="uptime kuma" scheme="https://hg8.sh/tags/uptime-kuma/"/>
    
    <category term="n8n" scheme="https://hg8.sh/tags/n8n/"/>
    
    <category term="tamper script" scheme="https://hg8.sh/tags/tamper-script/"/>
    
    <category term="ghidra" scheme="https://hg8.sh/tags/ghidra/"/>
    
    <category term="john the ripper" scheme="https://hg8.sh/tags/john-the-ripper/"/>
    
  </entry>
  
  <entry>
    <title>HackTheBox - Eureka</title>
    <link href="https://hg8.sh/posts/eureka/"/>
    <id>https://hg8.sh/posts/eureka/</id>
    <published>2025-08-29T22:00:00.000Z</published>
    <updated>2025-10-05T09:44:51.251Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;img width=&quot;578&quot; alt=&quot;eureka-hackthebox-infocard&quot; src=&quot;/images/eureka/Eureka.png&quot;&gt;


&lt;p&gt;Eureka just retired on HackTheBox, and it was a</summary>
        
      
    
    
    
    <category term="CTF" scheme="https://hg8.sh/categories/CTF/"/>
    
    <category term="HackTheBox" scheme="https://hg8.sh/categories/CTF/HackTheBox/"/>
    
    <category term="Hard Box" scheme="https://hg8.sh/categories/CTF/HackTheBox/Hard-Box/"/>
    
    
    <category term="linux" scheme="https://hg8.sh/tags/linux/"/>
    
    <category term="ctf" scheme="https://hg8.sh/tags/ctf/"/>
    
    <category term="writeup" scheme="https://hg8.sh/tags/writeup/"/>
    
    <category term="eureka" scheme="https://hg8.sh/tags/eureka/"/>
    
    <category term="command-injection" scheme="https://hg8.sh/tags/command-injection/"/>
    
    <category term="springboot" scheme="https://hg8.sh/tags/springboot/"/>
    
    <category term="spring-eureka" scheme="https://hg8.sh/tags/spring-eureka/"/>
    
    <category term="heapdump" scheme="https://hg8.sh/tags/heapdump/"/>
    
    <category term="traffic-hijacking" scheme="https://hg8.sh/tags/traffic-hijacking/"/>
    
    <category term="privilege-escalation" scheme="https://hg8.sh/tags/privilege-escalation/"/>
    
    <category term="bash" scheme="https://hg8.sh/tags/bash/"/>
    
    <category term="arithmetic-evaluation" scheme="https://hg8.sh/tags/arithmetic-evaluation/"/>
    
    <category term="nuclei" scheme="https://hg8.sh/tags/nuclei/"/>
    
  </entry>
  
  <entry>
    <title>HackTheBox - Cypher</title>
    <link href="https://hg8.sh/posts/cypher/"/>
    <id>https://hg8.sh/posts/cypher/</id>
    <published>2025-07-25T22:00:00.000Z</published>
    <updated>2025-10-05T09:42:53.420Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;img width=&quot;578&quot; alt=&quot;cypher-hackthebox&quot; src=&quot;/images/cypher/Cypher.png&quot;&gt;

&lt;p&gt;Cypher just retired! It was a Medium difficulty Linux machine</summary>
        
      
    
    
    
    <category term="CTF" scheme="https://hg8.sh/categories/CTF/"/>
    
    <category term="HackTheBox" scheme="https://hg8.sh/categories/CTF/HackTheBox/"/>
    
    <category term="Medium Box" scheme="https://hg8.sh/categories/CTF/HackTheBox/Medium-Box/"/>
    
    
    <category term="linux" scheme="https://hg8.sh/tags/linux/"/>
    
    <category term="sudo" scheme="https://hg8.sh/tags/sudo/"/>
    
    <category term="ssrf" scheme="https://hg8.sh/tags/ssrf/"/>
    
    <category term="python" scheme="https://hg8.sh/tags/python/"/>
    
    <category term="ctf" scheme="https://hg8.sh/tags/ctf/"/>
    
    <category term="writeup" scheme="https://hg8.sh/tags/writeup/"/>
    
    <category term="gobuster" scheme="https://hg8.sh/tags/gobuster/"/>
    
    <category term="rce" scheme="https://hg8.sh/tags/rce/"/>
    
    <category term="suid" scheme="https://hg8.sh/tags/suid/"/>
    
    <category term="cypher" scheme="https://hg8.sh/tags/cypher/"/>
    
    <category term="hackthebox" scheme="https://hg8.sh/tags/hackthebox/"/>
    
    <category term="medium" scheme="https://hg8.sh/tags/medium/"/>
    
    <category term="neo4j" scheme="https://hg8.sh/tags/neo4j/"/>
    
    <category term="cypher injection" scheme="https://hg8.sh/tags/cypher-injection/"/>
    
    <category term="privilege escalation" scheme="https://hg8.sh/tags/privilege-escalation/"/>
    
    <category term="bbot" scheme="https://hg8.sh/tags/bbot/"/>
    
    <category term="nmap" scheme="https://hg8.sh/tags/nmap/"/>
    
    <category term="java" scheme="https://hg8.sh/tags/java/"/>
    
    <category term="jar decompilation" scheme="https://hg8.sh/tags/jar-decompilation/"/>
    
    <category term="command injection" scheme="https://hg8.sh/tags/command-injection/"/>
    
    <category term="api exploitation" scheme="https://hg8.sh/tags/api-exploitation/"/>
    
    <category term="vulnerability chaining" scheme="https://hg8.sh/tags/vulnerability-chaining/"/>
    
    <category term="password reuse" scheme="https://hg8.sh/tags/password-reuse/"/>
    
    <category term="osint" scheme="https://hg8.sh/tags/osint/"/>
    
    <category term="arbitrary file read" scheme="https://hg8.sh/tags/arbitrary-file-read/"/>
    
    <category term="custom module" scheme="https://hg8.sh/tags/custom-module/"/>
    
  </entry>
  
  <entry>
    <title>HackTheBox - Cat</title>
    <link href="https://hg8.sh/posts/cat/"/>
    <id>https://hg8.sh/posts/cat/</id>
    <published>2025-07-04T22:00:00.000Z</published>
    <updated>2025-07-07T08:41:03.076Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;img width=&quot;578&quot; alt=&quot;cat-hackthebox&quot; src=&quot;/images/cat/Cat.png&quot;&gt;

&lt;p&gt;‘Cat’ box from HackTheBox has just been retired, and it was a solid</summary>
        
      
    
    
    
    <category term="CTF" scheme="https://hg8.sh/categories/CTF/"/>
    
    <category term="HackTheBox" scheme="https://hg8.sh/categories/CTF/HackTheBox/"/>
    
    <category term="Medium Box" scheme="https://hg8.sh/categories/CTF/HackTheBox/Medium-Box/"/>
    
    
    <category term="linux" scheme="https://hg8.sh/tags/linux/"/>
    
    <category term="cat" scheme="https://hg8.sh/tags/cat/"/>
    
  </entry>
  
  <entry>
    <title>Pwnable.kr - flag</title>
    <link href="https://hg8.sh/posts/pwnable/flag/"/>
    <id>https://hg8.sh/posts/pwnable/flag/</id>
    <published>2023-11-11T23:00:00.000Z</published>
    <updated>2025-06-06T10:25:05.373Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;&lt;img src=&quot;https://github-production-user-asset-6210df.s3.amazonaws.com/9076747/282297542-4a536c54-7ff6-45ee-a8da-72bed96925a2.png&quot;</summary>
        
      
    
    
    
    <category term="CTF" scheme="https://hg8.sh/categories/CTF/"/>
    
    <category term="pwnable" scheme="https://hg8.sh/categories/CTF/pwnable/"/>
    
    <category term="Toddler&#39;s Bottle" scheme="https://hg8.sh/categories/CTF/pwnable/Toddler-s-Bottle/"/>
    
    
    <category term="re" scheme="https://hg8.sh/tags/re/"/>
    
    <category term="pwn" scheme="https://hg8.sh/tags/pwn/"/>
    
    <category term="dynamic analysis" scheme="https://hg8.sh/tags/dynamic-analysis/"/>
    
    <category term="pwntools" scheme="https://hg8.sh/tags/pwntools/"/>
    
    <category term="flag" scheme="https://hg8.sh/tags/flag/"/>
    
  </entry>
  
  <entry>
    <title>Pwnable.kr - bof</title>
    <link href="https://hg8.sh/posts/pwnable/bof/"/>
    <id>https://hg8.sh/posts/pwnable/bof/</id>
    <published>2023-11-04T23:00:00.000Z</published>
    <updated>2025-06-06T11:11:50.506Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;&lt;img src=&quot;https://github-production-user-asset-6210df.s3.amazonaws.com/9076747/280545217-a30f8c4a-c968-4793-a4db-722904a7adbe.png&quot;</summary>
        
      
    
    
    
    <category term="CTF" scheme="https://hg8.sh/categories/CTF/"/>
    
    <category term="pwnable" scheme="https://hg8.sh/categories/CTF/pwnable/"/>
    
    <category term="Toddler&#39;s Bottle" scheme="https://hg8.sh/categories/CTF/pwnable/Toddler-s-Bottle/"/>
    
    
    <category term="re" scheme="https://hg8.sh/tags/re/"/>
    
    <category term="buffer overflow" scheme="https://hg8.sh/tags/buffer-overflow/"/>
    
    <category term="pwn" scheme="https://hg8.sh/tags/pwn/"/>
    
    <category term="dynamic analysis" scheme="https://hg8.sh/tags/dynamic-analysis/"/>
    
    <category term="bof" scheme="https://hg8.sh/tags/bof/"/>
    
    <category term="pwntools" scheme="https://hg8.sh/tags/pwntools/"/>
    
  </entry>
  
  <entry>
    <title>Buffer Overflow: Code Execution By Shellcode Injection</title>
    <link href="https://hg8.sh/posts/binary-exploitation/buffer-overflow-code-execution-by-shellcode-injection/"/>
    <id>https://hg8.sh/posts/binary-exploitation/buffer-overflow-code-execution-by-shellcode-injection/</id>
    <published>2023-10-27T22:00:00.000Z</published>
    <updated>2025-06-06T10:25:05.380Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;&lt;img src=&quot;https://github.com/hg8/hg8.github.io/assets/9076747/5be7a79d-5052-4ec5-b14f-b34221c5852e&quot; alt=&quot;buffer overflow part 3</summary>
        
      
    
    
    
    <category term="Binary Exploitation" scheme="https://hg8.sh/categories/Binary-Exploitation/"/>
    
    
    <category term="linux" scheme="https://hg8.sh/tags/linux/"/>
    
    <category term="binary exploitation" scheme="https://hg8.sh/tags/binary-exploitation/"/>
    
    <category term="buffer overflow" scheme="https://hg8.sh/tags/buffer-overflow/"/>
    
    <category term="c" scheme="https://hg8.sh/tags/c/"/>
    
  </entry>
  
  <entry>
    <title>Buffer Overflow: Reversing Assembly</title>
    <link href="https://hg8.sh/posts/binary-exploitation/buffer-overflow-reversing-assembly/"/>
    <id>https://hg8.sh/posts/binary-exploitation/buffer-overflow-reversing-assembly/</id>
    <published>2023-09-11T22:00:00.000Z</published>
    <updated>2025-06-06T10:25:05.380Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;&lt;img src=&quot;https://github.com/hg8/hg8.github.io/assets/9076747/ee65be39-04a5-49e2-b21a-b934ef44f696&quot; alt=&quot;buffer overflow</summary>
        
      
    
    
    
    <category term="Binary Exploitation" scheme="https://hg8.sh/categories/Binary-Exploitation/"/>
    
    
    <category term="linux" scheme="https://hg8.sh/tags/linux/"/>
    
    <category term="binary exploitation" scheme="https://hg8.sh/tags/binary-exploitation/"/>
    
    <category term="buffer overflow" scheme="https://hg8.sh/tags/buffer-overflow/"/>
    
    <category term="c" scheme="https://hg8.sh/tags/c/"/>
    
  </entry>
  
  <entry>
    <title>Buffer Overflow: Introduction</title>
    <link href="https://hg8.sh/posts/binary-exploitation/buffer-overflow-introduction/"/>
    <id>https://hg8.sh/posts/binary-exploitation/buffer-overflow-introduction/</id>
    <published>2022-11-21T23:00:00.000Z</published>
    <updated>2025-06-06T10:25:05.380Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;&lt;img src=&quot;https://github.com/hg8/hg8.github.io/assets/9076747/4eec46e9-8a8c-451e-8653-ada526ee7029&quot; alt=&quot;buffer overflow</summary>
        
      
    
    
    
    <category term="Binary Exploitation" scheme="https://hg8.sh/categories/Binary-Exploitation/"/>
    
    
    <category term="linux" scheme="https://hg8.sh/tags/linux/"/>
    
    <category term="binary exploitation" scheme="https://hg8.sh/tags/binary-exploitation/"/>
    
    <category term="buffer overflow" scheme="https://hg8.sh/tags/buffer-overflow/"/>
    
    <category term="c" scheme="https://hg8.sh/tags/c/"/>
    
  </entry>
  
  <entry>
    <title>HackTheBox - Talkative</title>
    <link href="https://hg8.sh/posts/talkative/"/>
    <id>https://hg8.sh/posts/talkative/</id>
    <published>2022-08-26T22:00:00.000Z</published>
    <updated>2025-06-06T10:25:05.382Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;&lt;img src=&quot;https://user-images.githubusercontent.com/9076747/164916795-5c33ab53-424b-4846-9bff-7b4c19ca529d.png&quot;</summary>
        
      
    
    
    
    <category term="CTF" scheme="https://hg8.sh/categories/CTF/"/>
    
    <category term="HackTheBox" scheme="https://hg8.sh/categories/CTF/HackTheBox/"/>
    
    <category term="Hard Box" scheme="https://hg8.sh/categories/CTF/HackTheBox/Hard-Box/"/>
    
    
    <category term="RCE" scheme="https://hg8.sh/tags/RCE/"/>
    
    <category term="docker" scheme="https://hg8.sh/tags/docker/"/>
    
    <category term="mongodb" scheme="https://hg8.sh/tags/mongodb/"/>
    
    <category term="Linux" scheme="https://hg8.sh/tags/Linux/"/>
    
    <category term="container" scheme="https://hg8.sh/tags/container/"/>
    
    <category term="CVE" scheme="https://hg8.sh/tags/CVE/"/>
    
    <category term="recon" scheme="https://hg8.sh/tags/recon/"/>
    
    <category term="jamovi" scheme="https://hg8.sh/tags/jamovi/"/>
    
    <category term="rocket.chat" scheme="https://hg8.sh/tags/rocket-chat/"/>
    
    <category term="pwncat" scheme="https://hg8.sh/tags/pwncat/"/>
    
    <category term="bolt" scheme="https://hg8.sh/tags/bolt/"/>
    
    <category term="cap-dac-read-search" scheme="https://hg8.sh/tags/cap-dac-read-search/"/>
    
    <category term="shocker" scheme="https://hg8.sh/tags/shocker/"/>
    
    <category term="webhook" scheme="https://hg8.sh/tags/webhook/"/>
    
    <category term="twig" scheme="https://hg8.sh/tags/twig/"/>
    
    <category term="ssti" scheme="https://hg8.sh/tags/ssti/"/>
    
    <category term="r-lang" scheme="https://hg8.sh/tags/r-lang/"/>
    
  </entry>
  
  <entry>
    <title>Bug Bounty Story: Escalating SSRF to RCE on AWS</title>
    <link href="https://hg8.sh/posts/bugbounty/ssrf-to-rce-aws/"/>
    <id>https://hg8.sh/posts/bugbounty/ssrf-to-rce-aws/</id>
    <published>2022-07-03T22:00:00.000Z</published>
    <updated>2025-06-06T10:25:05.384Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;Hey everyone, not a CTF write-up today but my first Bug Bounty Bounty story: SSRF escalation to RCE on AWS.&lt;/p&gt;
&lt;p&gt;The vulnerability was</summary>
        
      
    
    
    
    <category term="Bug Bounty" scheme="https://hg8.sh/categories/Bug-Bounty/"/>
    
    
    <category term="RCE" scheme="https://hg8.sh/tags/RCE/"/>
    
    <category term="SSRF" scheme="https://hg8.sh/tags/SSRF/"/>
    
    <category term="bug bounty" scheme="https://hg8.sh/tags/bug-bounty/"/>
    
    <category term="AWS" scheme="https://hg8.sh/tags/AWS/"/>
    
    <category term="IAM" scheme="https://hg8.sh/tags/IAM/"/>
    
  </entry>
  
  <entry>
    <title>HackTheBox - AdmirerToo</title>
    <link href="https://hg8.sh/posts/admirertoo/"/>
    <id>https://hg8.sh/posts/admirertoo/</id>
    <published>2022-05-27T22:00:00.000Z</published>
    <updated>2025-06-06T10:25:05.376Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;img alt=&quot;admiretoo-hackthebox&quot; src=&quot;https://user-images.githubusercontent.com/9076747/166099416-e02b4a36-942c-4177-9532-89b1781b0e85.png&quot;</summary>
        
      
    
    
    
    <category term="CTF" scheme="https://hg8.sh/categories/CTF/"/>
    
    <category term="HackTheBox" scheme="https://hg8.sh/categories/CTF/HackTheBox/"/>
    
    <category term="Hard Box" scheme="https://hg8.sh/categories/CTF/HackTheBox/Hard-Box/"/>
    
    
    <category term="linux" scheme="https://hg8.sh/tags/linux/"/>
    
    <category term="ssrf" scheme="https://hg8.sh/tags/ssrf/"/>
    
    <category term="vhost" scheme="https://hg8.sh/tags/vhost/"/>
    
    <category term="ffuf" scheme="https://hg8.sh/tags/ffuf/"/>
    
    <category term="fail2ban" scheme="https://hg8.sh/tags/fail2ban/"/>
    
    <category term="python" scheme="https://hg8.sh/tags/python/"/>
    
    <category term="port forwarding" scheme="https://hg8.sh/tags/port-forwarding/"/>
    
    <category term="PHP Object Injection" scheme="https://hg8.sh/tags/PHP-Object-Injection/"/>
    
    <category term="phpggc" scheme="https://hg8.sh/tags/phpggc/"/>
    
    <category term="CVE-2020-35476" scheme="https://hg8.sh/tags/CVE-2020-35476/"/>
    
    <category term="CVE-2021-21311" scheme="https://hg8.sh/tags/CVE-2021-21311/"/>
    
    <category term="CVE-2021-32749" scheme="https://hg8.sh/tags/CVE-2021-32749/"/>
    
    <category term="opencats" scheme="https://hg8.sh/tags/opencats/"/>
    
    <category term="opentsdb" scheme="https://hg8.sh/tags/opentsdb/"/>
    
    <category term="whois" scheme="https://hg8.sh/tags/whois/"/>
    
    <category term="regex" scheme="https://hg8.sh/tags/regex/"/>
    
  </entry>
  
  <entry>
    <title>HackTheBox - Fingerprint</title>
    <link href="https://hg8.sh/posts/fingerprint/"/>
    <id>https://hg8.sh/posts/fingerprint/</id>
    <published>2022-05-13T22:00:00.000Z</published>
    <updated>2025-06-06T10:25:05.387Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;img width=&quot;578&quot; alt=&quot;figerprint-hackthebox&quot;</summary>
        
      
    
    
    
    <category term="CTF" scheme="https://hg8.sh/categories/CTF/"/>
    
    <category term="HackTheBox" scheme="https://hg8.sh/categories/CTF/HackTheBox/"/>
    
    <category term="Insane Box" scheme="https://hg8.sh/categories/CTF/HackTheBox/Insane-Box/"/>
    
    
    <category term="linux" scheme="https://hg8.sh/tags/linux/"/>
    
    <category term="LFI" scheme="https://hg8.sh/tags/LFI/"/>
    
    <category term="JWT" scheme="https://hg8.sh/tags/JWT/"/>
    
    <category term="Cookie Forge" scheme="https://hg8.sh/tags/Cookie-Forge/"/>
    
    <category term="Crypto" scheme="https://hg8.sh/tags/Crypto/"/>
    
    <category term="ECB" scheme="https://hg8.sh/tags/ECB/"/>
    
    <category term="Command Injection" scheme="https://hg8.sh/tags/Command-Injection/"/>
    
    <category term="HQL Injection" scheme="https://hg8.sh/tags/HQL-Injection/"/>
    
    <category term="Bruteforce" scheme="https://hg8.sh/tags/Bruteforce/"/>
    
    <category term="XSS" scheme="https://hg8.sh/tags/XSS/"/>
    
    <category term="Reverse Shell" scheme="https://hg8.sh/tags/Reverse-Shell/"/>
    
    <category term="Flask" scheme="https://hg8.sh/tags/Flask/"/>
    
    <category term="SUID" scheme="https://hg8.sh/tags/SUID/"/>
    
  </entry>
  
  <entry>
    <title>Misc CTF - Request Smuggling</title>
    <link href="https://hg8.sh/posts/misc-ctf/request-smuggling/"/>
    <id>https://hg8.sh/posts/misc-ctf/request-smuggling/</id>
    <published>2022-01-14T23:00:00.000Z</published>
    <updated>2025-06-06T10:25:05.378Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;During a CTF I recently came across a very cool challenge on Request Smuggling. I have been wanting to try my theoretical knowledge of</summary>
        
      
    
    
    
    <category term="CTF" scheme="https://hg8.sh/categories/CTF/"/>
    
    <category term="Misc" scheme="https://hg8.sh/categories/CTF/Misc/"/>
    
    
    <category term="linux" scheme="https://hg8.sh/tags/linux/"/>
    
    <category term="beginner" scheme="https://hg8.sh/tags/beginner/"/>
    
    <category term="request smuggling" scheme="https://hg8.sh/tags/request-smuggling/"/>
    
  </entry>
  
  <entry>
    <title>HackTheBox - Travel</title>
    <link href="https://hg8.sh/posts/travels/"/>
    <id>https://hg8.sh/posts/travels/</id>
    <published>2022-01-01T23:00:00.000Z</published>
    <updated>2025-06-06T10:25:05.386Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;img width=&quot;580&quot; alt=&quot;travel-hackthebox&quot;</summary>
        
      
    
    
    
    <category term="CTF" scheme="https://hg8.sh/categories/CTF/"/>
    
    <category term="HackTheBox" scheme="https://hg8.sh/categories/CTF/HackTheBox/"/>
    
    <category term="Hard Box" scheme="https://hg8.sh/categories/CTF/HackTheBox/Hard-Box/"/>
    
    
    <category term="linux" scheme="https://hg8.sh/tags/linux/"/>
    
    <category term="git" scheme="https://hg8.sh/tags/git/"/>
    
    <category term="memcached" scheme="https://hg8.sh/tags/memcached/"/>
    
    <category term="docker" scheme="https://hg8.sh/tags/docker/"/>
    
    <category term="SSRF" scheme="https://hg8.sh/tags/SSRF/"/>
    
    <category term="ldap" scheme="https://hg8.sh/tags/ldap/"/>
    
    <category term="travel" scheme="https://hg8.sh/tags/travel/"/>
    
    <category term="phpmemcached" scheme="https://hg8.sh/tags/phpmemcached/"/>
    
    <category term="memcached injection" scheme="https://hg8.sh/tags/memcached-injection/"/>
    
    <category term="Gopher" scheme="https://hg8.sh/tags/Gopher/"/>
    
    <category term="deserialization" scheme="https://hg8.sh/tags/deserialization/"/>
    
    <category term="simplePie" scheme="https://hg8.sh/tags/simplePie/"/>
    
  </entry>
  
  <entry>
    <title>Misc CTF - GraphQL Injection</title>
    <link href="https://hg8.sh/posts/misc-ctf/graphql-injection/"/>
    <id>https://hg8.sh/posts/misc-ctf/graphql-injection/</id>
    <published>2021-11-25T23:00:00.000Z</published>
    <updated>2025-06-06T10:25:05.377Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;GraphQL is becoming more and more common nowadays and this challenge was the perfect way to digg into the subject and understand the</summary>
        
      
    
    
    
    <category term="CTF" scheme="https://hg8.sh/categories/CTF/"/>
    
    <category term="Misc" scheme="https://hg8.sh/categories/CTF/Misc/"/>
    
    
    <category term="linux" scheme="https://hg8.sh/tags/linux/"/>
    
    <category term="beginner" scheme="https://hg8.sh/tags/beginner/"/>
    
    <category term="GraphQL Injection" scheme="https://hg8.sh/tags/GraphQL-Injection/"/>
    
  </entry>
  
  <entry>
    <title>Misc CTF - XXE to SSRF</title>
    <link href="https://hg8.sh/posts/misc-ctf/xxe-to-ssrf/"/>
    <id>https://hg8.sh/posts/misc-ctf/xxe-to-ssrf/</id>
    <published>2021-10-28T22:00:00.000Z</published>
    <updated>2025-06-06T10:25:05.377Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;This fun little challenge highlight two issue at once: XML External Entity (XXE) and Server-side request forgery (SSRF) and show how</summary>
        
      
    
    
    
    <category term="CTF" scheme="https://hg8.sh/categories/CTF/"/>
    
    <category term="Misc" scheme="https://hg8.sh/categories/CTF/Misc/"/>
    
    
    <category term="linux" scheme="https://hg8.sh/tags/linux/"/>
    
    <category term="ssrf" scheme="https://hg8.sh/tags/ssrf/"/>
    
    <category term="beginner" scheme="https://hg8.sh/tags/beginner/"/>
    
    <category term="xxe" scheme="https://hg8.sh/tags/xxe/"/>
    
  </entry>
  
  <entry>
    <title>Misc CTF - PRNG Weakness</title>
    <link href="https://hg8.sh/posts/misc-ctf/PRNG%20Weakness/"/>
    <id>https://hg8.sh/posts/misc-ctf/PRNG%20Weakness/</id>
    <published>2021-09-15T22:00:00.000Z</published>
    <updated>2025-06-06T10:25:05.377Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;This challenge aims to highlight the weaknesses of PRNG (Pseudorandom Number Generator) algorithms.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Tl;Dr:&lt;/strong&gt; The</summary>
        
      
    
    
    
    <category term="CTF" scheme="https://hg8.sh/categories/CTF/"/>
    
    <category term="Misc" scheme="https://hg8.sh/categories/CTF/Misc/"/>
    
    
    <category term="linux" scheme="https://hg8.sh/tags/linux/"/>
    
    <category term="prng" scheme="https://hg8.sh/tags/prng/"/>
    
    <category term="beginner" scheme="https://hg8.sh/tags/beginner/"/>
    
  </entry>
  
  <entry>
    <title>Misc CTF - XSS to CSRF</title>
    <link href="https://hg8.sh/posts/misc-ctf/xss-to-csrf/"/>
    <id>https://hg8.sh/posts/misc-ctf/xss-to-csrf/</id>
    <published>2021-07-31T22:00:00.000Z</published>
    <updated>2025-06-06T10:25:05.377Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;This challenge highlight two issue at once: the very common Cross Site Scripting (XSS), Cross-site request forgery (CSRF) and how both</summary>
        
      
    
    
    
    <category term="CTF" scheme="https://hg8.sh/categories/CTF/"/>
    
    <category term="Misc" scheme="https://hg8.sh/categories/CTF/Misc/"/>
    
    
    <category term="linux" scheme="https://hg8.sh/tags/linux/"/>
    
    <category term="beginner" scheme="https://hg8.sh/tags/beginner/"/>
    
    <category term="xss" scheme="https://hg8.sh/tags/xss/"/>
    
    <category term="csrf" scheme="https://hg8.sh/tags/csrf/"/>
    
    <category term="web socket" scheme="https://hg8.sh/tags/web-socket/"/>
    
  </entry>
  
  <entry>
    <title>Misc CTF - Insecure Deserialization</title>
    <link href="https://hg8.sh/posts/misc-ctf/insecure-deserialization/"/>
    <id>https://hg8.sh/posts/misc-ctf/insecure-deserialization/</id>
    <published>2021-04-30T22:00:00.000Z</published>
    <updated>2025-06-06T10:25:05.377Z</updated>
    
    
      
      
        
        
    <summary type="html">&lt;p&gt;This challenge highlight an important and too common vulnerability: Insecure Deserialization.&lt;/p&gt;
&lt;p&gt;Let’s solve this challenge to</summary>
        
      
    
    
    
    <category term="CTF" scheme="https://hg8.sh/categories/CTF/"/>
    
    <category term="Misc" scheme="https://hg8.sh/categories/CTF/Misc/"/>
    
    
    <category term="linux" scheme="https://hg8.sh/tags/linux/"/>
    
    <category term="beginner" scheme="https://hg8.sh/tags/beginner/"/>
    
    <category term="insecure deserialization" scheme="https://hg8.sh/tags/insecure-deserialization/"/>
    
  </entry>
  
</feed>
