top of page

Search


Hack the Box Critical Ops
Summary: A vulnerable web app generated JSON Web Tokens (JWT's) on the client side. The signing secret and client-side generation logic were discoverable in the client JavasScript, allowing me to forge a valid token with elevated privileges and access the admin ticket board. This post shows how the issue was identified, exploited, and how to fix it properly. Client-side JWT token attacks: In normal circumstances the JWT's are signed by the server so endpoints can verify the t
BlueDolphin
Oct 13


🔍 Sherlock Scenario: Investigating a Malware Intrusion
🧩 Attack Summary In this Sherlock Scenario , you step into the role of a SOC analyst investigating a suspected intrusion. By analyzing...
BlueDolphin
Aug 20


Tampering Vulnerability Lab - Node JS
Checkout a server side Node JS Parameter Tampering Vulnerability and how we can fix it.
BlueDolphin
Jul 30


Hack the Box - Sea
YouTube Video Writeup Engagement Flow Tools used Burpsuite WhatWeb OWASP ZAP Netcat Linpeas Tactics/Techniques CVE-2023-41425 - Wonder...
BlueDolphin
Jul 10


Splunk for Beginners: FREE Security Lab with Botsv3 Dataset (Dashboards, Alerts & Queries!)
Learn how to install Splunk, import security logs, run SPL queries, and build dashboards. Perfect for cybersecurity beginners seeking hands-on skills.
BlueDolphin
May 24


Pikaptchu - Hack the Box - DFIR
Scenario 🛠️ Scenario Overview An attacker sends a phishing email to the victim, claiming it's an urgent Microsoft Office update. The...
BlueDolphin
May 5


NeuroSync-D - Hack the Box Lab
| CVE-2025-29927 (auth bypass in Next.js)
| SSRF to scan and find internal services
| LFI to steal secrets
| Redis injection for command execution
BlueDolphin
Apr 11


FTP Data Exfiltration Investigation
Scenario: FTP Data Exfiltration Investigation - A major incident occurred at Forela. 20 GB of data were stolen from internal s3 buckets.
BlueDolphin
Apr 4


CSRF SameSite Strict bypass via sibling domain
This lab's live chat feature is vulnerable to cross-site WebSocket hijacking (CSWSH)
BlueDolphin
Mar 16


Exploiting CSRF: Bypassing SameSite Strict with Client-Side Redirects
This lab's change email function is vulnerable to CSRF.
BlueDolphin
Jan 26


Hack the Box - Investigation (Medium)
Engagement Flow Tools used Burpsuite EVTX Parser by omerbenamram WhatWeb Netcat SCP Ghidra Moonwalk Tactics/Techniques File upload abuse...
BlueDolphin
Dec 20, 2024


Server-Side Parameter Pollution (SSPP) Through Query Strings
YouTube Index: Introduction What is Server-Side Parameter Pollution Understanding the Query String in an API Request Example Injecting...
BlueDolphin
Nov 23, 2024


Boss Of The SOC V1 Blue Team Lab
High Level Details: Attacker 1: 40.80.148.42 Attacker 2: 23.22.63.114 CMS: Joomla Site: imnotreallybatman.com Site IP: 192.168.250.70...
BlueDolphin
Aug 13, 2024


DownUnderCTF - Web - Python Prototype Pollution
This challenge demonstrates a classic prototype pollution vulnerability.
BlueDolphin
Jul 7, 2024


UIUCTF 2024 - Fare Evasion
A Classic MD5 SQL Injection Bypass Attack.
BlueDolphin
Jul 2, 2024


US Cyber Games 2024 - Certified
Extract a plain text RSA key from HTTP, format it, save as .key, and import into Wireshark with the correct IP, PORT, and protocol for decr
BlueDolphin
Jun 9, 2024


US Cyber Games 2024 - Ding-O-Tron
Visual Workflow Summary Summary Identifying hidden functions generated dynamically was at the core of this challenge. While the giveFlag...
BlueDolphin
Jun 9, 2024


NahmaCon CTF 2024 - 1337 Malware
Follow along with my YouTube video for an interactive walkthrough. Visual Workflow summary The challenge starts with a provided PCAP file...
BlueDolphin
May 26, 2024


Splunk Incident Handling - Exploitation Detection THM series 2/7
Note - You can view my video writeup below 📺🎬🎥 https://youtu.be/xnjWVL7i7HA 📺🎬🎥 This room covers an incident Handling scenario...
BlueDolphin
May 20, 2024


Hack The Box Machine Write-Up: Codify
Checkout my YouTube Video Writeup https://youtu.be/BbXbbBDW48c Engagement Flow Tools used John Chat GPT Moonwalk Tactics/Techniques...
BlueDolphin
May 6, 2024


Hack the Box - Incident Response - Meerkat
Attackers workflow mapped Attacker's Summary This summary will cover the attackers workflow as discovered from my point of view. I...
BlueDolphin
Mar 25, 2024


Hack the Box - Forensics - Red Miners
CHALLENGE DESCRIPTION In the race for Vitalium on Mars, the villainous Board of Arodor resorted to desperate measures, needing funds for...
BlueDolphin
Mar 3, 2024


Hack the Box - WEB - Juggling facts
CHALLENGE DESCRIPTION An organization seems to possess knowledge of the true nature of pumpkins. Can you find out what they honestly know...
BlueDolphin
Feb 3, 2024


Post Incident Response - I like to - Sherlock by HTB
Attackers workflow mapped Attacker's Summary This summary will cover the attackers workflow as discovered from my point of view. I...
BlueDolphin
Dec 2, 2023
bottom of page