# Writeups

<table data-view="cards" data-full-width="false"><thead><tr><th data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="image">Cover image</th></tr></thead><tbody><tr><td><a href="writeups/hackthebox">hackthebox</a></td><td><a href="https://2078903645-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FW98xJQuX2kc5QKEyMN0C%2Fuploads%2FlYrSooIZzLE7jtSL8z4l%2Fhackthebox.png?alt=media&#x26;token=26066d49-5daa-48c0-b8ca-d06ac5d7c281">hackthebox.png</a></td></tr><tr><td><a href="writeups/sherlocks">sherlocks</a></td><td><a href="https://2078903645-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FW98xJQuX2kc5QKEyMN0C%2Fuploads%2FEDVPzCK87V2KvEbHeyXt%2Fsherlocks.jpg?alt=media&#x26;token=26ba6b80-2042-4eb6-8bf4-ab366ee6bc0a">sherlocks.jpg</a></td></tr><tr><td><a href="writeups/challenges">challenges</a></td><td><a href="https://2078903645-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FW98xJQuX2kc5QKEyMN0C%2Fuploads%2F4FYpbnssDxbrT7fCKCFB%2Fchallenges.jpg?alt=media&#x26;token=6c7fd08b-c1a2-43d6-a2fc-f75a562865f1">challenges.jpg</a></td></tr></tbody></table>

***

{% updates format="full" %}
{% update date="2025-12-28" tags="challenges,osint" %}

## [The Puppet Master](https://brunosergio.gitbook.io/ctfs/writeups/challenges/the-puppet-master)

Os metadados do nome do arquivo revelaram a origem da NZDF, a pesquisa reversa de imagens identificou o veículo blindado Bushmaster, os  documentos de aquisição do Ministério da Defesa confirmaram a variante do modelo e uma placa de veículo capturada em um vídeo da NZDF no YouTube levou a uma consulta no registro da NZTA, resultando no número de identificação do veículo (VIN) 6E9BMAR44MBZX6014.

<div align="left"><figure><img src="https://2078903645-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FW98xJQuX2kc5QKEyMN0C%2Fuploads%2FV47p6J0KUTzgpOHq0Oxe%2Fosint.png?alt=media&#x26;token=c1d62519-8c44-4797-a49c-adc90b6a4f13" alt="" width="75"><figcaption></figcaption></figure></div>
{% endupdate %}

{% update date="2025-12-25" tags="hackthebox,linux,ipsec,sudo" %}

## [Expressway](https://brunosergio.gitbook.io/ctfs/writeups/hackthebox/expressway)

A scan revealed IKE VPN on UDP 500. IKEv1 Aggressive Mode exposed the PSK hash, cracked with rockyou.txt to get SSH credentials. Then CVE-2025-32463 on sudo 1.9.17 gave root.

<div align="left"><figure><img src="https://2078903645-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FW98xJQuX2kc5QKEyMN0C%2Fuploads%2FpqsTb6EUFMwoS9kwQvSb%2Fexpressway.png?alt=media&#x26;token=59c3427c-6150-439e-b2d4-4b753e8ac69c" alt="" width="75"><figcaption></figcaption></figure></div>
{% endupdate %}

{% update date="2025-08-12" tags="hackthebox,tunneling,linux" %}

## [Editor](https://brunosergio.gitbook.io/ctfs/writeups/hackthebox/editor)

Vulnerabilidade de execução remota de código (RCE) sem autenticação no XWiki SolrSearch (CVE-2025-24893) para obter acesso inicial; credenciais em texto simples no arquivo `hibernate.cfg.xml` para movimentação lateral via SSH como usuário oliver; e sequestro do PATH do binário SUID do Netdata ndsudo (CVE-2024-32019) para obter privilégios de root.

<div align="left"><figure><img src="https://2078903645-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FW98xJQuX2kc5QKEyMN0C%2Fuploads%2FPjt9ytFHSFXFsdjnamWF%2Feditor.png?alt=media&#x26;token=4aec7606-fe11-45b5-95e6-8a900b1e2112" alt="" width="75"><figcaption></figcaption></figure></div>
{% endupdate %}

{% update date="2025-08-03" tags="hackthebox,webmail,roundcube,insecure-deserialization,container-breakout,sudo" %}

## [Outbound](https://brunosergio.gitbook.io/ctfs/writeups/hackthebox/outbound)

Instância do Roundcube Webmail 1.6.10 exposta foi comprometida através do CVE-2025-49113, uma vulnerabilidade de desserialização insegura que permitiu a execução remota de código, e finalmente um ataque de symlink explorando o CVE-2025-27591 na ferramenta de monitorização `below` para alcançar privilégios de root.

<div align="left"><figure><img src="https://2078903645-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FW98xJQuX2kc5QKEyMN0C%2Fuploads%2FGdA42UgCbc8r4TmA17p5%2Foutbound.png?alt=media&#x26;token=b8ca2af9-8ba0-4190-9f0f-935fc3107e54" alt="" width="75"><figcaption></figcaption></figure></div>
{% endupdate %}

{% update date="2023-01-15" tags="hackthebox,grafana,mysql,git,linux" %}

## [Ambassador](https://brunosergio.gitbook.io/ctfs/writeups/hackthebox/ambassador)

Vulnerabilidade de "path traversal" no Grafana 8.2.0 (CVE-2021-43798) levando à exfiltração de dados do `grafana.db`, pivô de credenciais do MySQL, acesso SSH como desenvolvedor e execução remota de código (RCE) na API do Consul por meio de um token exposto no histórico do Git.

<div align="left"><figure><img src="https://2078903645-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FW98xJQuX2kc5QKEyMN0C%2Fuploads%2FbDb6OwsLkNepkBJsyadm%2Fambassador.png?alt=media&#x26;token=c12cf832-fcae-4c04-a88d-8414353c1d9c" alt="" width="75"><figcaption></figcaption></figure></div>
{% endupdate %}
{% endupdates %}

***


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://brunosergio.gitbook.io/ctfs/readme.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
