
PingPong — HackTheBox Season 10 Walkthrough
PingPong is a brutally complex Insane-rated Windows box featuring a bidirectional forest trust, cross-realm Kerberos pivoting through a Hyper-V internal network, JEA ConstrainedLanguage bypass via XmlDocument XXE, and a multi-stage AD CS certificate abuse chain spanning two domains.

Logging — HackTheBox Season 10 Walkthrough
Logging is a Windows Domain Controller box that chains credential recovery, shadow credentials, a DLL hijack scheduled task, and a full ESC17 WSUS MITM attack to achieve Domain Admin — all while navigating Protected Users restrictions and a disabled Update Orchestrator service.

Silentium — HackTheBox Season 10 Walkthrough
Silentium chains two Flowise CVEs — an unauthenticated password reset token leak and authenticated RCE — with a Gogs symlink exploit to achieve root. A masterclass in chaining modern app vulnerabilities.

Garfield — HackTheBox Season 10 Walkthrough
Garfield is a fiendishly complex Active Directory box that chains a hidden scriptPath ACE, logon script hijacking, RBCD against an RODC, and a forged RODC golden ticket to compromise a full Windows domain. If you want to understand how Read-Only Domain Controllers can be weaponized, this is the box for you.

DevArea — HackTheBox Season 10 Walkthrough
DevArea chains a SOAP service SSRF through Hoverfly middleware RCE to foothold, then escalates via Flask session forgery, command injection, and a symlink/log-write trick to root. A deeply layered box with real-world misconfigurations at every turn.

Snapped — HackTheBox Walkthrough
Snapped is a brutal Hard box that chains a pre-auth Nginx UI backup endpoint disclosure into a command injection foothold, then escalates via a race-condition exploit in snap-confine that poisons the dynamic linker to achieve root.

Kobold — HackTheBox Season 10 Walkthrough
Kobold chains an unauthenticated MCP server command injection with a sneaky newgrp trick that quietly grants Docker group membership — all without a single password prompt.

VariaType — HackTheBox Season 10 Walkthrough
VariaType is a CVE-chaining masterpiece — three distinct vulnerabilities in font-processing tools combine to take you from unauthenticated to root. If you want practice identifying real-world supply-chain CVEs, this box delivers.

Principal — HackTheBox Walkthrough
Principal chains a fresh CVE in pac4j-jwt — where encryption was mistaken for authentication — with SSH CA key abuse to go from zero to root on a Java Spring Boot platform.

Gavel — HackTheBox Walkthrough
Gavel chains an exposed git repo, a subtle PDO prepared statement SQL injection, and a creative PHP sandbox escape — overwriting the php.ini from inside the sandbox itself — to reach root.