This section contains step-by-step technical write-ups of Hack The Box machines, written with a focus on:

  • Clear enumeration methodology
  • Explanation of why each command is used
  • Vulnerability identification and exploitation logic
  • Privilege escalation reasoning
  • Reproducibility and learning value

All write-ups are based on hands-on practice and are intended for learning and portfolio purposes.


Extended Notes & Study Material

In addition to these write-ups, expanded study notes, theory, diagrams, and structured learning material can be found in my personal repository:

๐Ÿ”— https://github.com/lameiro0x/pentesting-path-htb