# Writeups and Walkthroughs

<figure><img src="/files/W1PZ0WZgKuuWqv2rC6wX" alt=""><figcaption></figcaption></figure>

## Try Hack Me (THM)

<div align="left" data-full-width="false"><figure><img src="/files/LZEkLpqoqopsDkv1mtxi" alt=""><figcaption><p>tryhackme.com - © TryHackMe</p></figcaption></figure></div>

### Rooms

* [OWASP](/writeups-and-walkthroughs/thm/owasp.md)

#### Active Directory

* [Active Directory Basics](/writeups-and-walkthroughs/thm/active-directory-basics.md) (This room will introduce the basic concepts and functionality provided by Active Directory)
* [AD: Basic Enumeration](/writeups-and-walkthroughs/thm/ad-basic-enumeration.md) (This room covers various Active Directory enumeration techniques, their use cases as well as drawbacks)
* [Enumerating Active Directory](/writeups-and-walkthroughs/thm/enumerating-active-directory.md) (This room covers various Active Directory enumeration techniques, their use cases as well as drawbacks)
* [Breaching Active Directory](/writeups-and-walkthroughs/thm/breaching-active-directory.md) (This network covers techniques and tools that can be used to acquire that first set of AD credentials that can then be used to enumerate AD)
* [Attacking Kerberos](/writeups-and-walkthroughs/thm/attacking-kerberos.md) (Learn how to abuse the Kerberos Ticket Granting Service inside of a Windows Domain Controller)
* [Attacktive Directory](/writeups-and-walkthroughs/thm/attacktive-directory.md) (99% of Corporate networks run off of AD. But can you exploit a vulnerable Domain Controller?)
* [Exploiting Active Directory](/writeups-and-walkthroughs/thm/exploiting-active-directory.md) (Learn common AD exploitation techniques that can allow you to reach your goal in an AD environment)
* [Post-Exploitation Basics ](/writeups-and-walkthroughs/thm/post-exploitation-basics.md)(Learn the basics of post-exploitation and maintaining access with mimikatz, bloodhound, powerview and msfvenom)
* [Lateral Movement and Pivoting](/writeups-and-walkthroughs/thm/lateral-movement-and-pivoting.md) (Learn about common techniques used to move laterally across a Windows network).

### CTFs

* [RootMe](/writeups-and-walkthroughs/thm/rootme.md)
* [Simple CTF](/writeups-and-walkthroughs/thm/simple-ctf.md)
* [Eternal Blue](/writeups-and-walkthroughs/thm/eternal-blue.md)
* [Vulnversity](/writeups-and-walkthroughs/thm/vulnversity.md)
* [Pickle Rick](/writeups-and-walkthroughs/thm/pickle-rick.md)
* [Brooklyn Nine Nine](/writeups-and-walkthroughs/thm/brooklyn-nine-nine.md)
* [Kenobi](/writeups-and-walkthroughs/thm/kenobi.md)
* [Bounty Hacker](/writeups-and-walkthroughs/thm/bounty-hacker.md)
* [Overpass](/writeups-and-walkthroughs/thm/overpass.md)
* [LazyAdmin](/writeups-and-walkthroughs/thm/lazyadmin.md)
* [Ignite](/writeups-and-walkthroughs/thm/ignite.md)
* [Bolt](/writeups-and-walkthroughs/thm/bolt.md)
* [Agent Sudo](/writeups-and-walkthroughs/thm/agent-sudo.md)
* [Startup](/writeups-and-walkthroughs/thm/startup.md)
* [Wgel](/writeups-and-walkthroughs/thm/wgel.md)
* [Blog](/writeups-and-walkthroughs/thm/blog.md)
* [ColdBox](/writeups-and-walkthroughs/thm/coldbox.md)
* [Lian\_Yu](/writeups-and-walkthroughs/thm/lian_yu.md)
* [Blaster](/writeups-and-walkthroughs/thm/blaster.md)
* [Ice](/writeups-and-walkthroughs/thm/ice.md)
* [The Sticker Shop](/writeups-and-walkthroughs/thm/the-sticker-shop.md)

***

## Hack The Box (HTB)

<div align="left"><figure><img src="/files/JiYzKWied18gLmFZ3VFD" alt=""><figcaption><p>hackthebox.com - © HACKTHEBOX</p></figcaption></figure></div>

* [Devel](/writeups-and-walkthroughs/hackthebox/devel.md)
* [Delivery](/writeups-and-walkthroughs/hackthebox/delivery.md)
* [Active](/writeups-and-walkthroughs/hackthebox/active.md)
* [Analytics](/writeups-and-walkthroughs/hackthebox/analytics.md)
* [Bashed](/writeups-and-walkthroughs/hackthebox/bashed.md)
* [Valentine](/writeups-and-walkthroughs/hackthebox/valentine.md)
* [Sau](/writeups-and-walkthroughs/hackthebox/sau.md)
* [Sunday](/writeups-and-walkthroughs/hackthebox/sunday.md)
* [Cap](/writeups-and-walkthroughs/hackthebox/cap.md)
* [Bizness](/writeups-and-walkthroughs/hackthebox/bizness.md)
* Chemistry - OnGoing
* Celestial - OnGoing
* Poison - OnGoing

***

## VulnHub

<div align="left"><figure><img src="/files/0rekCWjgxCnUmbRYSORH" alt="" width="330"><figcaption><p><a href="https://www.vulnhub.com/">https://www.vulnhub.com/</a></p></figcaption></figure></div>

* [Brainpain (BoF)](/writeups-and-walkthroughs/vulnhub/brainpain-bof.md)

***

## Vulnix

<div align="left"><figure><img src="/files/XTz7ErdgHyihkJOw3I45" alt="" width="375"><figcaption><p>© VulNyx</p></figcaption></figure></div>

* Admin

## DockerLabs

<div align="left"><figure><img src="/files/Kgpl2x3KFFQH2NMAtGoG" alt="" width="144"><figcaption><p><a href="https://dockerlabs.es/">https://dockerlabs.es/</a></p></figcaption></figure></div>

* [Trust](/writeups-and-walkthroughs/dockerlabs/trust.md)
* [Upload](/writeups-and-walkthroughs/dockerlabs/upload.md)
* [Vacaciones](/writeups-and-walkthroughs/dockerlabs/vacaciones.md)

***

## HomeMade Labs 🏠🔬

* [Active Directory](/writeups-and-walkthroughs/homemade-labs/active-directory.md)
* [Pivoting](https://app.gitbook.com/o/s2H3MdEB0Qp2IbE58Gxw/s/rRWtuMw6xkkeDjZfkcWC/~/changes/174/homemade-labs/pivoting)
* [Buffer Overflow (BoF)](https://app.gitbook.com/o/s2H3MdEB0Qp2IbE58Gxw/s/rRWtuMw6xkkeDjZfkcWC/~/changes/174/homemade-labs/buffer-overflow-bof)

***

## WAPT

### Portswigger Web Security Academy

<div align="left"><figure><img src="/files/76g1dJIhcwXxkZlMFBru" alt=""><figcaption><p>@PortSwigger Ltd</p></figcaption></figure></div>

[PortSwigger - Web Security Academy (My Walkthrough)](/writeups-and-walkthroughs/portswigger-web-security-academy.md)

***

### DVWA&#x20;

<div align="left"><figure><img src="/files/xn0UpVozwp2gIQHDegPn" alt="" width="250"><figcaption><p><a href="https://github.com/digininja/DVWA">https://github.com/digininja/DVWA</a></p></figcaption></figure></div>

* [Install and configure DVWA](/writeups-and-walkthroughs/dvwa/install-and-configure-dvwa.md)
* [Command Injection](/writeups-and-walkthroughs/dvwa/command-injection.md)
* [Cross Site Request Forgery (CSRF)](/writeups-and-walkthroughs/dvwa/csrf.md)
* [File Inclusion (LFI + RFI)](/writeups-and-walkthroughs/dvwa/file-inclusion.md)
* [SQL Injection (SQLi)](/writeups-and-walkthroughs/dvwa/sql-injection.md)

***

### OWASP - Mutillidae II

<div align="left"><figure><img src="/files/zY3evBNIwT5vgrBF9mM2" alt=""><figcaption><p><a href="https://owasp.org/www-project-mutillidae-ii/">https://owasp.org/www-project-mutillidae-ii/</a></p></figcaption></figure></div>

* [Install & configure OWASP Mutillidae II](/writeups-and-walkthroughs/mutillidae-ii/install-and-configure-owasp-mutillidae-ii.md)
* [SQL Injection (SQLi)](/writeups-and-walkthroughs/mutillidae-ii/sqli.md)
* [Command Injection](/writeups-and-walkthroughs/mutillidae-ii/command-injection.md)
* [IDOR & File Inclusion](/writeups-and-walkthroughs/mutillidae-ii/idor-and-file-inclusion.md)
* [Cross-Site Scripting (XSS)](/writeups-and-walkthroughs/mutillidae-ii/xss.md)

***

### OWASP - SecureBank

<div align="left"><figure><img src="/files/gZsOPIKhzTOmJXHE2Ba5" alt=""><figcaption><p><a href="https://owasp.org/www-project-securebank/">https://owasp.org/www-project-securebank/</a></p></figcaption></figure></div>

* Install and configure OWASP Secure Bank


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://dev-angelist.gitbook.io/writeups-and-walkthroughs/writeups-and-walkthroughs.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
