Skip to content

Scope / Constraints

  • Platform: Hack The Box
  • Authorized testing only

Target Summary

  • OS:
  • Role:
  • IP(s):
  • Domain (if applicable):

Recon

Commands

Key Findings

Notes / Hypotheses

Enumeration

Commands

Key Findings

Attack Surface Analysis

Foothold

Method

Commands

Why This Worked

Privilege Escalation

Local Enumeration

Exploitation Path

Why This Worked

Loot / Proof

  • Credentials:
  • Hashes:
  • Flags:

Timeline / Decision Points

  • What I tried
  • Why I pivoted
  • What failed and why

Lessons Learned

  • Patterns noticed
  • New techniques
  • Mistakes to avoid next time