Hackthebox
My WriteUps for HackTheBox CTFs, Machines, and Sherlocks.
Install / Use
/learn @jon-brandy/HacktheboxREADME
NOTES: NO TIMELINE ACTIVITIES TABLE CREATION FOR EVERY CHALLS & ONLY BRIEF ANALYSIS FOR MALWARE CASES
| No. | Cases | Lessons Learned |
| :-- | ---------------------------------------------------------------------------------------------------------------------------------- | :-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------: |
| 1. | Meerkat | Credential stuffing detection, Bonitasoft CVE exploitation, Packet filtering, Custom column value analysis |
| 2. | Bumblebee | SQLite3 file analysis, Epoch timestamp conversion, NGINX access.log parsing |
| 3. | Lockpick | Static malware analysis with Ghidra, Reverse engineering C-based malware, Python scripting for reversing encryption logic, JSON parsing automation |
| 4. | Constellation | Discord URL forensic analysis, URL unfurling techniques |
| 5. | OpTinselTrace-4 | Threat hunting and attacker IP identification, Port scanning detection, Printer hacking network forensics |
| 6. | Litter | PCAP network traffic analysis, DNS tunneling identification |
| 7. | Logjammer | Windows Event Log analysis using Event Viewer |
| 8. | Heartbreaker-Continuum | PEStudio and Ghidra for code size identification, VirusTotal for file metadata, Hex editor for obfuscated strings offsets, MITRE ATT&CK technique identification |
| 9. | Hyperfiletable | Parsing raw MFT data with analyzeMFT, Using MFTExplorer for ZoneID and file size analysis
