Scope / Constraints
- Platform: Hack The Box
- Authorized testing only
Target Summary
- OS:
- Role:
- IP(s):
- Domain (if applicable):
Recon
Commands
Key Findings
Notes / Hypotheses
Enumeration
Commands
Key Findings
Attack Surface Analysis
Method
Commands
Why This Worked
Privilege Escalation
Local Enumeration
Exploitation Path
Why This Worked
Loot / Proof
- Credentials:
- Hashes:
- Flags:
Timeline / Decision Points
- What I tried
- Why I pivoted
- What failed and why
Lessons Learned
- Patterns noticed
- New techniques
- Mistakes to avoid next time