HTB-OSCP Prepration writeup
HTB-Writeup
HTB-OSCP Prepration writeup
HTB Machines
Machines | OS | Points | Write-UP | Avatars |
---|---|---|---|---|
Lame | Linux | 20 | Click here | ![]() |
Nineveh | Linux | 30 | Click here | ![]() |
Poison | FreeBSD | 30 | Click here | ![]() |
Buff | Windows | 20 | Click here | ![]() |
Jeeves | Windows | 30 | Click here | ![]() |
Bart | Windows | 30 | Click here | ![]() |
Tally | Windows | 40 | Click here | ![]() |
Active | Windows | 20 | Click here | ![]() |
Jail | Linux | 50 | Click here | ![]() |
Falafel | Linux | 40 | Click here | ![]() |
DevOops | Linux | 30 | Click here | ![]() |
Hawk | Linux | 30 | Click here | ![]() |
Netmon | Windows | 20 | Click here | ![]() |
Lightweight | Linux | 30 | Click here | ![]() |
La Casa De Papel | Linux | 20 | Click here | ![]() |
HTB Academy Modules
Module Name | Difficulty | Summary |
---|---|---|
Network Enumeration with Nmap | Easy | Fundamentals of network discovery and scanning using Nmap. |
Linux Privilege Escalation | Easy | Identifying and exploiting common Linux privilege escalation vectors. |
Windows Privilege Escalation | Medium | Exploitation of Windows misconfigurations for local escalation. |
Stack-Based Buffer Overflows on Linux x86 | Medium | Classic BoF exploitation on x86 Linux systems. |
Attacking Web Applications with Ffuf | Easy | Web directory and file enumeration using ffuf. |
SQLMap Essentials | Easy | Using SQLMap to find and exploit SQLi vulnerabilities. |
Active Directory LDAP | Medium | Understanding and exploiting LDAP in AD environments. |
Active Directory PowerView and BloodHound | Medium | Enumerating AD with PowerView and BloodHound. |
HTB Pro Labs
Lab Name | Focus | Summary |
---|---|---|
Dante | Beginner AD, Escalation | Covers full OSCP-style workflow with enumeration, exploitation, and privilege escalation. |
RastaLabs | AD Exploitation | Enterprise AD with Exchange, lateral movement, and domain escalation. |
Zephyr | Red-Team AD | Kerberos attacks, domain trust abuse, and pivoting through AD. |
Offshore | Complex AD | Perimeter breaches, tunneling, and modern AD misconfigurations. |