This section contains step-by-step technical write-ups of Hack The Box machines, written with a focus on:
- Clear enumeration methodology
- Explanation of why each command is used
- Vulnerability identification and exploitation logic
- Privilege escalation reasoning
- Reproducibility and learning value
All write-ups are based on hands-on practice and are intended for learning and portfolio purposes.
Extended Notes & Study Material
In addition to these write-ups, expanded study notes, theory, diagrams, and structured learning material can be found in my personal repository: