Loading...
avatar
Articles
49
Tags
52
Categories
2
Home
Writeups
Articles
Cheatsheets
UnChleuHackerHTB - Garfield
Search
Home
Writeups
Articles
Cheatsheets

HTB - Garfield

Created2026-05-08|Updated2026-05-09|writeups
|Post Views:
cover of previous post
Previous
HTB - Vintage
IntroductionVintage is a Hard challenge on HackTheBox that simulates an assumed breach scenario in an Active Directory environment where NTLM is completely disabled. The entire exploit relies exclusively on Kerberos, making it an extremely educational challenge for pentesters accustomed to relying on NTLM. With the phase-out of NTLM announced by Microsoft for future versions of Windows Server, this type of environment will become the norm. We might as well prepare for it now. ConfigurationFi...
cover of next post
Next
First Driver Developpment
IntroductionTo truly control a Windows system, you must operate at Ring 0, i.e., the kernel. The problem is that from user mode (Ring 3), you cannot interact directly with Ring 0, so it is impossible to modify the kernel’s internal structures, disable an EDR’s monitoring mechanisms, or manipulate process protections. Tools like WinDbg allow you to explore and modify kernel memory, but they are not viable in production environments: WinDbg requires a reboot to enable debug mode, a second machi...
avatar
UnChleuHacker
Articles
49
Tags
52
Categories
2
Follow Me
Contents
  1. 1. ScriptPath Hijacking
  2. 2. Password Reset
  3. 3. RBCD Attack
  4. 4. KeyList Attack
Recent Posts
HTB - Vintage
HTB - Vintage2026-05-09
HTB - Garfield
HTB - Garfield2026-05-08
First Driver Developpment
First Driver Developpment2026-05-08
ClickOnce Hijacking
ClickOnce Hijacking2026-05-08
CLR Loading
CLR Loading2026-04-26
©2025 - 2026 By UnChleuHackerFramework Hexo 7.3.0|Theme Butterfly 5.4.0-b2
Search
Loading Database