Hack The Box Blog
Popular Topics
  • JOIN NOW
ALL Security 101 Red Teaming Blue Teaming Cyber Teams Education CISO Diaries Customer Stories Write-Ups News Career Stories Humans of HTB Artificial Intelligence Threat Intelligence
ALL Security 101 Red Teaming Blue Teaming Cyber Teams Education CISO Diaries Customer Stories Write-Ups News Career Stories Humans of HTB Artificial Intelligence Threat Intelligence
Hack the Box Blog

PwnOS: From Admin to Root—Exploiting CVE-2024-9474

5 min read

Oct 08, 2025

Hack the Box Blog
5 min read

Write-Ups

PwnOS: From Admin to Root—Exploiting CVE-2024-9474

diskordia avatar

diskordia, Oct, 08
2025

End_Of_File avatar

End_Of_File, Oct, 08
2025

Hack the Box Blog

Write-Ups

12 min read

CyberJunkie explains: Data exfiltration via Windows Sandbox

CyberJunkie avatar CyberJunkie, Aug 12, 2025

Hack the Box Blog

Write-Ups

18 min read

Creating Linux Symbol Tables for Volatility: Step-by-step guide

Odysseus (c4n0pus) avatar Odysseus (c4n0pus), May 20, 2025

Hack the Box Blog

Write-Ups

14 min read

Uni CTF 2022: UNIX socket injection to custom RCE POP chain - Spell Orsterra

Rayhan0x01 avatar Rayhan0x01, Dec 30, 2022

Hack the Box Blog

Write-Ups

10 min read

Business CTF 2022: Defeating modern malware techniques - Mr Abilgate

Shad3 avatar Shad3, Nov 26, 2022

Hack the Box Blog

Write-Ups

10 min read

Business CTF 2022: Bleichenbacher's '06 RSA signature forgery - BBGun06

WizardAlfredo avatar WizardAlfredo, Nov 25, 2022

Hack the Box Blog

Write-Ups

8 min read

Business CTF 2022: Invalid curve attack - 400 Curves

WizardAlfredo avatar WizardAlfredo, Nov 19, 2022

Receive our weekly
blog digest 📩

Ready to start your
hacking journey?

JOIN NOW
Hack The Box: Cybersecurity Training

The #1 platform to build attack-ready
teams and organizations.

Get a demo

Forrester wave leader
Aicpa Soc 2 Cyber Essentials
ISO 27001 ISO 27701 ISO 9001
G2 rating Capterra rating

Products
Teams
Courses & Certifications Cyber Ranges Enterprise Attack Simulations Cloud Infrastructure Simulations Capture The Flag Tabletop Exercises Talent Sourcing
Individuals
Courses & Certifications Hacking Labs Defensive Labs Red Team Labs Capture The Flag Job Board
Solutions
Job Roles
Red Teams Blue Teams Purple Teams
Industries
Government Higher Education Finance Professional Services
Use Cases
Technical Onboarding Team Benchmarking Candidate Assessment Threat Management Code Vulnerability Crisis Simulation Governance & Compliance
Resources
Community Blog Industry Reports Webinars AMAs Learn with HTB Customer Stories Cheat Sheets Compliance Sheets Glossary Guides & Templates Parrot OS Help Center
Programs
Channel & Resellers Ambassador Program Affiliate Program SME Program
Company
About us Careers Brand Guidelines Certificate Validation Trust Center Vulnerability Disclosure Product Updates Status
Contact Us
Press Support Enterprise Sales
Partners
Become a Partner Register a Deal
Store
HTB Swag Buy Gift Cards
Products
Teams
Courses & Certifications Cyber Ranges Enterprise Attack Simulations Cloud Infrastructure Simulations Capture The Flag Tabletop Exercises Talent Sourcing

Individuals

Courses & Certifications Hacking Labs Defensive Labs Red Team Labs Capture The Flag Job Board
Solutions
Job Roles
Red Teams Blue Teams Purple Teams

Industries

Government Higher Education Finance Professional Services

Use Cases

Technical Onboarding Team Benchmarking Candidate Assessment Threat Management Code Vulnerability Crisis Simulation Governance & Compliance
Resources
Community Blog Industry Reports Webinars AMAs Learn with HTB Customer Stories Cheat Sheets Compliance Sheets Glossary Guides & Templates Parrot OS Help Center

Programs

Channel & Resellers Ambassador Program Affiliate Program SME Program
Company
About us Careers Brand Guidelines Certificate Validation Trust Center Vulnerability Disclosure Product Updates Status

Contact Us

Press Support Enterprise Sales

Partners

Become a Partner Register a Deal

Store

HTB Swag Buy Gift Cards
Cookie Settings
Privacy Policy
User Agreement
© 2025 Hack The Box