<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>HackTheBox on d3bo</title><link>/ctf/htb-ctf/</link><description>Recent content in HackTheBox on d3bo</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>Copyright (c) 2025 Hyas</copyright><lastBuildDate>Mon, 08 Jan 2024 12:16:22 +0100</lastBuildDate><atom:link href="/ctf/htb-ctf/index.xml" rel="self" type="application/rss+xml"/><item><title>Rookie Mistake</title><link>/ctf/htb-ctf/rookie_mistake/</link><pubDate>Mon, 27 Oct 2025 00:00:00 +0000</pubDate><guid>/ctf/htb-ctf/rookie_mistake/</guid><description>#!/usr/bin/env python3 from pwn import * e = ELF(&amp;#34;./rookie_mistake_patched&amp;#34;) context.binary = e # Set the target binary for pwntools context.terminal = [&amp;#34;kitty&amp;#34;, &amp;#34;-e&amp;#34;] # Terminal to use for GDB debugging HOST = &amp;#34;46.</description></item><item><title>Rookie Salvation</title><link>/ctf/htb-ctf/rookie_salvation/</link><pubDate>Mon, 27 Oct 2025 00:00:00 +0000</pubDate><guid>/ctf/htb-ctf/rookie_salvation/</guid><description>#!/usr/bin/env python3 from pwn import * e = ELF(&amp;#34;./rookie_salvation_patched&amp;#34;) context.binary = e # Set the target binary for pwntools context.terminal = [&amp;#34;kitty&amp;#34;, &amp;#34;-e&amp;#34;] # Terminal to use for GDB debugging HOST = &amp;#34;46.</description></item><item><title>Restaurant</title><link>/ctf/htb-ctf/restaurant/</link><pubDate>Mon, 30 Jun 2025 00:00:00 +0000</pubDate><guid>/ctf/htb-ctf/restaurant/</guid><description>leak libc &amp;amp; ret2libc</description></item><item><title>Debugging Interface</title><link>/ctf/htb-ctf/debugging-interface/</link><pubDate>Tue, 16 Jul 2024 00:00:00 +0000</pubDate><guid>/ctf/htb-ctf/debugging-interface/</guid><description>We accessed the embedded device&amp;rsquo;s asynchronous serial debugging interface while it was operational and captured some messages that were being transmitted over it.</description></item><item><title>Execute</title><link>/ctf/htb-ctf/execute/</link><pubDate>Tue, 16 Jul 2024 00:00:00 +0000</pubDate><guid>/ctf/htb-ctf/execute/</guid><description>#!/usr/bin/env python3 from pwn import * e = ELF(&amp;#34;./execute_patched&amp;#34;) HOST = &amp;#34;83.136.249.253&amp;#34; PORT = 56508 context.binary = e context.terminal = [&amp;#39;tmux&amp;#39;, &amp;#39;splitw&amp;#39;, &amp;#39;-h&amp;#39;] gdb_script = &amp;#39;&amp;#39;&amp;#39; b main continue &amp;#39;&amp;#39;&amp;#39; def conn(): if args.</description></item><item><title>PDFy</title><link>/ctf/htb-ctf/pdfy/</link><pubDate>Tue, 16 Jul 2024 00:00:00 +0000</pubDate><guid>/ctf/htb-ctf/pdfy/</guid><description>La web del reto es simple, consiste en que nos pide una url y la transforma en pdf
Al descargar el pdf y analizarlo con exiftool, vemos el programa que se está usando para transformar las webs en pdf</description></item><item><title>The Needle</title><link>/ctf/htb-ctf/the-needle/</link><pubDate>Tue, 16 Jul 2024 00:00:00 +0000</pubDate><guid>/ctf/htb-ctf/the-needle/</guid><description>As a part of our SDLC process, we&amp;rsquo;ve got our firmware ready for security testing. Can you help us by performing a security assessment?</description></item></channel></rss>