<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://plur1bu5.dev/</id><title>Plur1bu5</title><subtitle>Offensive security, Active Directory pentesting, CTF writeups, and cybersecurity research by plur1bu5.</subtitle> <updated>2026-04-24T16:14:33+01:00</updated> <author> <name>plur1bu5</name> <uri>https://plur1bu5.dev/</uri> </author><link rel="self" type="application/atom+xml" href="https://plur1bu5.dev/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://plur1bu5.dev/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2026 plur1bu5 </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>Freelancer: a hard HackTheBox machine</title><link href="https://plur1bu5.dev/posts/freelancer-htb-machine/" rel="alternate" type="text/html" title="Freelancer: a hard HackTheBox machine" /><published>2026-03-20T10:00:00+00:00</published> <updated>2026-04-06T18:54:36+01:00</updated> <id>https://plur1bu5.dev/posts/freelancer-htb-machine/</id> <content type="text/html" src="https://plur1bu5.dev/posts/freelancer-htb-machine/" /> <author> <name>plur1bu5</name> </author> <category term="Offensive Security" /> <summary>Hard HackTheBox Overview Freelancer is a hard box with a creative initial access chain through a freelancing web application. A logical flaw in the password reset flow lets you activate an account without confirmation, and an IDOR in the QR-based SSO lets you log in as admin. From there it’s MSSQL impersonation for RCE, a full memory dump with credentials buried inside, and RBCD to finish...</summary> </entry> <entry><title>Search: a hard HackTheBox machine</title><link href="https://plur1bu5.dev/posts/Search-htb-machine/" rel="alternate" type="text/html" title="Search: a hard HackTheBox machine" /><published>2026-03-20T10:00:00+00:00</published> <updated>2026-04-06T18:54:36+01:00</updated> <id>https://plur1bu5.dev/posts/Search-htb-machine/</id> <content type="text/html" src="https://plur1bu5.dev/posts/Search-htb-machine/" /> <author> <name>plur1bu5</name> </author> <category term="Offensive Security" /> <summary>Hard HackTheBox Overview Search is a hard Active Directory box. Initial access comes from a password visible in an image on the web server. From there it’s kerberoasting, password spraying, digging through an xlsx file in a redirected folder share, and a chain of credential pivots that eventually leads to abusing a certificate template for privilege escalation. Still finishing this one up...</summary> </entry> <entry><title>BlackField: a Hard HackTheBox machine</title><link href="https://plur1bu5.dev/posts/Blackfield-htb-machine/" rel="alternate" type="text/html" title="BlackField: a Hard HackTheBox machine" /><published>2026-03-19T10:00:00+00:00</published> <updated>2026-04-06T18:54:36+01:00</updated> <id>https://plur1bu5.dev/posts/Blackfield-htb-machine/</id> <content type="text/html" src="https://plur1bu5.dev/posts/Blackfield-htb-machine/" /> <author> <name>plur1bu5</name> </author> <category term="Offensive Security" /> <summary>Hard HackTheBox Overview Blackfield is a hard Active Directory box. Guest access lets you enumerate usernames, AS-REP roasting gives you an initial foothold, and a ForceChangePassword edge in bloodhound opens up a forensic share containing an lsass dump. From there you extract a hash for a backup operator account, abuse VSS shadow copies to grab the NTDS, and dump the domain. Reconnaissa...</summary> </entry> <entry><title>Vintage: a hard HackTheBox machine</title><link href="https://plur1bu5.dev/posts/vintage-htb-machine/" rel="alternate" type="text/html" title="Vintage: a hard HackTheBox machine" /><published>2026-03-17T10:00:00+00:00</published> <updated>2026-04-06T18:54:36+01:00</updated> <id>https://plur1bu5.dev/posts/vintage-htb-machine/</id> <content type="text/html" src="https://plur1bu5.dev/posts/vintage-htb-machine/" /> <author> <name>plur1bu5</name> </author> <category term="Offensive Security" /> <summary>Hard HackTheBox Overview Vintage is a hard assumed-breach Active Directory box. You start with credentials for a low-privileged user in a domain where NTLM is disabled, forcing kerberos-only authentication throughout. The path involves gMSA abuse, targeted kerberoasting, password spraying, DPAPI credential decryption to pivot between users, and finally RBCD to fully compromise the domain....</summary> </entry> <entry><title>Cascade: A medium HackTheBox machine</title><link href="https://plur1bu5.dev/posts/cascade-htb-machine/" rel="alternate" type="text/html" title="Cascade: A medium HackTheBox machine" /><published>2026-03-16T10:00:00+00:00</published> <updated>2026-04-06T18:54:36+01:00</updated> <id>https://plur1bu5.dev/posts/cascade-htb-machine/</id> <content type="text/html" src="https://plur1bu5.dev/posts/cascade-htb-machine/" /> <author> <name>plur1bu5</name> </author> <category term="Offensive Security" /> <summary>Medium HackTheBox Overview Cascade is a medium Active Directory box and probably my most detailed writeup in terms of methodology. A legacy password attribute left in LDAP gives the first foothold, and from there it’s share enumeration, VNC password decryption, reverse engineering a custom .NET audit tool to extract an AES-encrypted password, and finally abusing AD Recycle Bin access to r...</summary> </entry> </feed>
