MonitorsFour HTB — From Web Enumeration to Docker Escape
Walkthrough of the MonitorsFour box: web enumeration, vulnerable service exploitation, container pivot, and Docker escape to root the host.
Read on MediumResearch & Writeups
Walkthroughs of CTF rooms, HackTheBox machines, and security research — published on Medium.
Featured
Selected writeups covering web exploitation, container escapes, and post-exploitation.
Walkthrough of the MonitorsFour box: web enumeration, vulnerable service exploitation, container pivot, and Docker escape to root the host.
Read on MediumWalkthrough of the Corridor room focused on insecure direct object references — enumerate, identify the IDOR pattern, and grab the flag.
Read on MediumLoading latest from Medium…
New writeups published regularly. Subscribe on Medium to get them in your feed.