<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>HTB Blog > Write-Ups</title>
        <link>https://www.hackthebox.gr/rss/blog/write-ups</link>
        <description>All the latest news and insights about cybersecurity from Hack The Box. Hacking trends, insights, interviews, stories, and much more</description>
        <language>en</language>
        <atom:link href="https://www.hackthebox.gr/rss/blog/write-ups" rel="self" type="application/rss+xml" />
        <image>
            <url>
                https://www.hackthebox.gr/images/landingv3/logo-htb-blog.svg
            </url>
            <title>HTB Blog > Write-Ups</title>
            <link>https://www.hackthebox.gr/rss/blog/write-ups</link>
        </image>
                    <item>
                <title>PwnOS: From Admin to Root—Exploiting CVE-2024-9474</title>
                <link>https://www.hackthebox.gr/blog/cve-2024-9474-panos-command-injection</link>
                <description>Walk through CVE-2024-9474, a PAN-OS privilege escalation flaw enabling command injection from admin to root. Includes PwnOS demo, exploitation steps, and defense tips.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/kjob7iWWfogiI8B318HhdErSbJkfraho.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Write-Ups</category>
                <pubDate>Wed, 08 Oct 2025 14:18:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/cve-2024-9474-panos-command-injection</guid>
            </item>
                    <item>
                <title>CyberJunkie explains: Data exfiltration via Windows Sandbox</title>
                <link>https://www.hackthebox.gr/blog/windows-sandbox-data-exfiltration-attack-forensics</link>
                <description>Learn how attackers can exploit Windows Sandbox to exfiltrate data, bypass defenses, and evade forensics—plus key detection tips and mitigations.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/3w2OIBWvwNQqAEVPAh9kVTv2YJGRftE9.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Write-Ups</category>
                <pubDate>Tue, 12 Aug 2025 02:47:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/windows-sandbox-data-exfiltration-attack-forensics</guid>
            </item>
                    <item>
                <title>Creating Linux Symbol Tables for Volatility: Step-by-step guide</title>
                <link>https://www.hackthebox.gr/blog/how-to-create-linux-symbol-tables-volatility</link>
                <description>This post explores how Volatility 3 works, what Symbol Tables are, and how you can go about creating them.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/vC16W20C0hSyHMp0wC5cRKLzZnMxWClB.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Write-Ups</category>
                <pubDate>Tue, 20 May 2025 10:40:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/how-to-create-linux-symbol-tables-volatility</guid>
            </item>
                    <item>
                <title>awfasf</title>
                <link>https://www.hackthebox.gr/blog/test-123-123-</link>
                <description>adfadsf</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/images/landingv3/og/og-blog.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Write-Ups</category>
                <pubDate>Wed, 12 Feb 2025 18:51:09 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/test-123-123-</guid>
            </item>
                    <item>
                <title>Unlock your potential as a SOC Analyst with HTB Academy&#039;s new Job Role Path</title>
                <link>https://www.hackthebox.gr/blog/soc-job-role-path-announcement</link>
                <description>The HTB Academy proudly presents its highly anticipated SOC Analyst Job Role Path, designed to empower individuals like you with the necessary skills and expertise to excel as analyst!</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/nuyjhJZgMmgX3gXAhXLxTJrQ99S6ru9R.png" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Write-Ups</category>
                <pubDate>Wed, 23 Aug 2023 01:43:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/soc-job-role-path-announcement</guid>
            </item>
                    <item>
                <title>Uni CTF 2022: UNIX socket injection to custom RCE POP chain - Spell Orsterra</title>
                <link>https://www.hackthebox.gr/blog/uni-ctf-2022-spell-orsterra-writeup</link>
                <description>This blog post will cover the creator&#039;s perspective, challenge motives, and the write-up of the web challenge Spell Orsterra from UNI CTF 2022.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/39Ar6yqH6UnG64YyllwOZvLUBs7HpwJ2.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Write-Ups</category>
                <pubDate>Fri, 30 Dec 2022 05:59:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/uni-ctf-2022-spell-orsterra-writeup</guid>
            </item>
                    <item>
                <title>Business CTF 2022: Defeating modern malware techniques - Mr Abilgate</title>
                <link>https://www.hackthebox.gr/blog/business-ctf-2022-write-up-mr-abilgate</link>
                <description>This blog post will cover the creator&#039;s perspective, challenge motives, and the write-up of the Mr Abilgate challenge from 2022&#039;s Business CTF.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/k6MrdGHekswlRMR4ZRGf3M8g2SsmATnC.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Write-Ups</category>
                <pubDate>Sat, 26 Nov 2022 01:13:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/business-ctf-2022-write-up-mr-abilgate</guid>
            </item>
                    <item>
                <title>Business CTF 2022: Bleichenbacher&#039;s &#039;06 RSA signature forgery - BBGun06</title>
                <link>https://www.hackthebox.gr/blog/business-ctf-2022-write-up-bbgun06</link>
                <description>This blog post will cover the creator&#039;s perspective, challenge motives, and the write-up of the crypto challenge BBGun06 from 2022&#039;s Business CTF.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/VCaKRKLW2VJzNeJt41vqkpmWzHuiOlWn.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Write-Ups</category>
                <pubDate>Fri, 25 Nov 2022 11:32:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/business-ctf-2022-write-up-bbgun06</guid>
            </item>
                    <item>
                <title>Business CTF 2022: Invalid curve attack - 400 Curves</title>
                <link>https://www.hackthebox.gr/blog/business-ctf-2022-400-curves-write-up</link>
                <description>This blog post will cover the creator&#039;s perspective, challenge motives, and the write-up of the crypto challenge 400 Curves from Business CTF 2022.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/ut1BBF3XGE6CYNA64fUpW64tQw33LgcT.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Write-Ups</category>
                <pubDate>Sat, 19 Nov 2022 09:55:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/business-ctf-2022-400-curves-write-up</guid>
            </item>
                    <item>
                <title>Business CTF 2022: Chaining Self XSS with Cache Poisoning - Felonious Forums</title>
                <link>https://www.hackthebox.gr/blog/business-ctf-2022-felonious-forums-write-up</link>
                <description>This blog post will cover the creator&#039;s perspective, challenge motives, and the write-up of the web challenge Felonious Forums from Business CTF 2022.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/PKB0ZmPLAcldmKOnnPQWlcMiyG3uQagN.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>Write-Ups</category>
                <pubDate>Fri, 18 Nov 2022 01:17:00 +0000</pubDate>
                <guid>https://www.hackthebox.gr/blog/business-ctf-2022-felonious-forums-write-up</guid>
            </item>
            </channel>
</rss>
