A collection of detailed writeups for machines and scenarios from the HackViser platform.
Each writeup covers the full attack chain — recon, enumeration, exploitation, post-exploitation, and lessons learned.
| Machine | Category | Difficulty | Tags |
|---|---|---|---|
| SentryNode | Web | Medium | Flask, PyYAML RCE, Broken Auth, JWT |
Hackviser/
└── Write-ups/
└── MachineName/
└── README.md
Each writeup follows a structured approach:
- Recon — Port scanning, service enumeration
- Enumeration — Directory fuzzing, source analysis, information gathering
- Exploitation — Vulnerability identification and execution
- Post-Exploitation — Privilege escalation, persistence, flag collection
- Lessons Learned — Key takeaways and remediation advice
Written by k41r0s3 — penetration tester and CTF player.
All writeups are for educational purposes only and are written against authorized lab environments.
More writeups coming soon.