Exploitation is the phase where identified vulnerabilities are actively abused to gain unauthorized access, execute code, or escalate privileges within a target environment.
The objective is to reliably convert confirmed weaknesses into practical access, while maintaining control, stability, and situational awareness throughout the engagement.
This section focuses on practical exploitation techniques, emphasizing understanding exploit conditions, payload behavior, and post-exploitation positioning rather than blind tool usage.
This section contains distilled notes from my Hack The Box – Pentesting Path study.
Full repository (expanded notes, diagrams, screenshots):
https://github.com/lameiro0x/pentesting-path-htb
Service Attacks Overview Attacking common services is about understanding how organizations expose file sharing, databases, remote access, and email workflows. These services often sit on predictable ports and accept standard authentication methods, which makes them ideal targets during exploitation. The goal is to validate access, enumerate data, and identify misconfigurations that expose sensitive information. A clean workflow documents what you tested, how you authenticated, and what the impact is.
Most service attacks follow the same pattern: identify the service, test authentication and permissions, then pivot to protocol specific abuse. If you can list shares, execute queries, or establish remote sessions, you can usually expand into credential harvesting or lateral movement. Many attacks are not exotic, they are simply weak credentials or unsafe defaults. This is why strong enumeration and careful validation matter more than running random exploits.
...
Introduction This topic brings together three very common web attack families: HTTP verb tampering, insecure direct object references, and XML external entity injection. They look different on the surface, but all three usually come from the same core weakness: the application trusts client-controlled input more than it should, and the backend does not enforce validation and authorization consistently. In practice, this means a tester can often move from a small logic flaw to data exposure, privilege escalation, or even server-side code execution.
...
Introduction Active Directory exploitation is the phase where raw enumeration data becomes actual control over users, hosts, and eventually the domain itself. By this point, the tester is no longer just collecting names, groups, and services, but turning those relationships into passwords, tickets, shells, replication rights, and privileged access. The important shift is strategic: instead of asking “what exists,” the question becomes “which path gives the highest-value access with the least effort and the lowest operational cost.”
...
Why Application Fingerprinting Matters Common enterprise applications deserve focused attention because they often expose far more than a normal website. A CMS, a CI/CD server, a ticketing portal, or a monitoring platform usually sits on top of sensitive data, administrative workflows, and privileged backend services. Even when the core application is well maintained, weak credentials, exposed admin panels, unsafe plugins, and risky default features can still create a direct path to code execution or lateral movement. For that reason, application fingerprinting is not just reconnaissance; it is the first step in understanding which attack paths are realistically available.
...
Introduction Scope, Assumptions, and Recon Strategy An enterprise network assessment usually starts with far less certainty than a lab writeup suggests. In this scenario, the client wanted to know what an anonymous internet user could reach from the DMZ and whether that access could eventually lead to internal compromise, including Active Directory impact. No VPN, web application, or domain credentials were provided, so the attack path had to begin with discovery, validation, and careful prioritization. That is important because an external penetration test is not the same thing as a full web application assessment: the goal is to find realistic footholds and high-impact attack paths, not spend the entire week cataloging every missing security header.
...