<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>CTF Write-Ups on Introverted Bytes</title><link>https://introvertedbytes.com/categories/ctf-write-ups/</link><description>Recent content in CTF Write-Ups on Introverted Bytes</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>© 2026 Kasyap Girijan</copyright><lastBuildDate>Sat, 06 Dec 2025 20:30:00 +0530</lastBuildDate><atom:link href="https://introvertedbytes.com/categories/ctf-write-ups/index.xml" rel="self" type="application/rss+xml"/><item><title>Hack The Box | Editor Writeup</title><link>https://introvertedbytes.com/security/ctf-write-ups/hack-the-box/editor/</link><pubDate>Sat, 06 Dec 2025 20:30:00 +0530</pubDate><guid>https://introvertedbytes.com/security/ctf-write-ups/hack-the-box/editor/</guid><description>A walkthrough for the &amp;ldquo;Editor&amp;rdquo; machine on Hack The Box, detailing the exploitation of XWiki RCE (CVE-2025-24893) and leveraging a Netdata ndsudo vulnerability (CVE-2024-32019) for root privilege escalation.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://introvertedbytes.com/security/ctf-write-ups/hack-the-box/editor/featured.jpg"/></item><item><title>Hack The Box | BoardLight Writeup</title><link>https://introvertedbytes.com/security/ctf-write-ups/hack-the-box/boardlight/</link><pubDate>Fri, 27 Sep 2024 23:00:00 +0530</pubDate><guid>https://introvertedbytes.com/security/ctf-write-ups/hack-the-box/boardlight/</guid><description>A walkthrough for the &amp;ldquo;BoardLight&amp;rdquo; machine on Hack The Box, detailing the steps taken to compromise the target.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://introvertedbytes.com/security/ctf-write-ups/hack-the-box/boardlight/featured.png"/></item><item><title>Hack The Box | Devvortex Writeup</title><link>https://introvertedbytes.com/security/ctf-write-ups/hack-the-box/devvortex/</link><pubDate>Sat, 27 Apr 2024 21:00:00 +0530</pubDate><guid>https://introvertedbytes.com/security/ctf-write-ups/hack-the-box/devvortex/</guid><description>A solution guide for the &amp;ldquo;Devvortex&amp;rdquo; challenge on Hack The Box, covering the exploitation path from user to root.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://introvertedbytes.com/security/ctf-write-ups/hack-the-box/devvortex/featured.png"/></item><item><title>Hack The Box | Codify Writeup</title><link>https://introvertedbytes.com/security/ctf-write-ups/hack-the-box/codify/</link><pubDate>Sat, 06 Apr 2024 23:00:00 +0530</pubDate><guid>https://introvertedbytes.com/security/ctf-write-ups/hack-the-box/codify/</guid><description>A step-by-step writeup for the &amp;ldquo;Codify&amp;rdquo; box on Hack The Box, demonstrating the vulnerabilities exploited to gain access.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://introvertedbytes.com/security/ctf-write-ups/hack-the-box/codify/featured.png"/></item><item><title>Hack The Box | Analytics Writeup</title><link>https://introvertedbytes.com/security/ctf-write-ups/hack-the-box/analytics/</link><pubDate>Sat, 23 Mar 2024 23:00:00 +0530</pubDate><guid>https://introvertedbytes.com/security/ctf-write-ups/hack-the-box/analytics/</guid><description>A walkthrough for the &amp;ldquo;Analytics&amp;rdquo; machine on Hack The Box, demonstrating how to exploit a Metabase Pre-auth RCE (CVE-2023-38646) and leverage the &amp;ldquo;GameOverlay&amp;rdquo; kernel vulnerability to gain root access.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://introvertedbytes.com/security/ctf-write-ups/hack-the-box/analytics/featured.png"/></item><item><title>Hack The Box | Manager Writeup</title><link>https://introvertedbytes.com/security/ctf-write-ups/hack-the-box/manager/</link><pubDate>Sat, 16 Mar 2024 23:00:00 +0530</pubDate><guid>https://introvertedbytes.com/security/ctf-write-ups/hack-the-box/manager/</guid><description>A walkthrough for the &amp;ldquo;Manager&amp;rdquo; machine on Hack The Box, covering RID cycling and password spraying against MSSQL, retrieving credentials via xp_dirtree, and exploiting AD CS ESC7 to escalate privileges to Domain Admin.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://introvertedbytes.com/security/ctf-write-ups/hack-the-box/manager/featured.png"/></item><item><title>Hack The Box | Builder Writeup</title><link>https://introvertedbytes.com/security/ctf-write-ups/hack-the-box/builder/</link><pubDate>Fri, 15 Mar 2024 23:00:00 +0530</pubDate><guid>https://introvertedbytes.com/security/ctf-write-ups/hack-the-box/builder/</guid><description>A walkthrough for the &amp;ldquo;Builder&amp;rdquo; machine on Hack The Box, demonstrating the exploitation of a Jenkins arbitrary file read vulnerability (CVE-2024-23897) to retrieve credentials and the decryption of stored SSH keys via the Script Console for privilege escalation.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://introvertedbytes.com/security/ctf-write-ups/hack-the-box/builder/featured.png"/></item><item><title>Hack The Box | CrazyHosting Writeup</title><link>https://introvertedbytes.com/security/ctf-write-ups/hack-the-box/crazyhosting/</link><pubDate>Sat, 02 Mar 2024 23:00:00 +0530</pubDate><guid>https://introvertedbytes.com/security/ctf-write-ups/hack-the-box/crazyhosting/</guid><description>A guide for the &amp;ldquo;CrazyHosting&amp;rdquo; machine on Hack The Box, covering how to hijack a user session via exposed Spring Boot Actuator endpoints, achieve command injection for a reverse shell, and escalate privileges using SSH configuration vulnerabilities.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://introvertedbytes.com/security/ctf-write-ups/hack-the-box/crazyhosting/featured.png"/></item><item><title>Hack The Box | Keeper Writeup</title><link>https://introvertedbytes.com/security/ctf-write-ups/hack-the-box/keeper/</link><pubDate>Sat, 10 Feb 2024 00:00:00 +0530</pubDate><guid>https://introvertedbytes.com/security/ctf-write-ups/hack-the-box/keeper/</guid><description>A walkthrough for the &amp;ldquo;Keeper&amp;rdquo; machine on Hack The Box, covering default credential exploitation in Request Tracker, extracting a KeePass master password from a memory dump, and converting PuTTY keys to gain root access.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://introvertedbytes.com/security/ctf-write-ups/hack-the-box/keeper/featured.png"/></item><item><title>Hack The Box | Broker Writeup</title><link>https://introvertedbytes.com/security/ctf-write-ups/hack-the-box/broker/</link><pubDate>Fri, 02 Feb 2024 23:00:00 +0530</pubDate><guid>https://introvertedbytes.com/security/ctf-write-ups/hack-the-box/broker/</guid><description>A walkthrough for the &amp;ldquo;Broker&amp;rdquo; machine on Hack The Box, detailing the exploitation of Apache ActiveMQ (CVE-2023-46604) and privilege escalation via a custom Nginx configuration to gain root access.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://introvertedbytes.com/security/ctf-write-ups/hack-the-box/broker/featured.png"/></item></channel></rss>