<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>HackTheBox on Policy to Packets</title>
    <link>https://www.policytopackets.com/categories/hackthebox/</link>
    <description>Recent content in HackTheBox on Policy to Packets</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <managingEditor>reedveggleston@gmail.com (Reed Eggleston)</managingEditor>
    <webMaster>reedveggleston@gmail.com (Reed Eggleston)</webMaster>
    <copyright>© 2026 Reed Eggleston</copyright>
    <lastBuildDate>Mon, 09 Mar 2026 18:29:00 +0000</lastBuildDate><atom:link href="https://www.policytopackets.com/categories/hackthebox/index.xml" rel="self" type="application/rss+xml" />
    
    <item>
      <title>(Writeup) HackTheBox Labs - Machine - Expressway</title>
      <link>https://www.policytopackets.com/writeups/hackthebox/machines/expressway/</link>
      <pubDate>Mon, 09 Mar 2026 18:29:00 +0000</pubDate>
      <author>reedveggleston@gmail.com (Reed Eggleston)</author>
      <guid>https://www.policytopackets.com/writeups/hackthebox/machines/expressway/</guid>
      <description>Easy Linux Box. Exploiting IKE Aggressive Mode to capture and crack a VPN PSK hash, then abusing a sudo CVE for root.</description>
      
    </item>
    
    <item>
      <title>(Writeup) HackTheBox Labs - Challenge - OnlyHacks</title>
      <link>https://www.policytopackets.com/writeups/hackthebox/challenges/onlyhacks/</link>
      <pubDate>Sat, 14 Feb 2026 18:22:00 +0000</pubDate>
      <author>reedveggleston@gmail.com (Reed Eggleston)</author>
      <guid>https://www.policytopackets.com/writeups/hackthebox/challenges/onlyhacks/</guid>
      <description>Demonstrating cross-site scripting (XSS) exploitation, session cookie theft, and practical web application enumeration in a Very Easy web challenge.</description>
      
    </item>
    
    <item>
      <title>(Writeup) HackTheBox Labs - Challenge - Slippy</title>
      <link>https://www.policytopackets.com/writeups/hackthebox/challenges/slippy/</link>
      <pubDate>Thu, 12 Feb 2026 21:20:00 +0000</pubDate>
      <author>reedveggleston@gmail.com (Reed Eggleston)</author>
      <guid>https://www.policytopackets.com/writeups/hackthebox/challenges/slippy/</guid>
      <description>Demonstrating Zip Slip exploitation, Jinja2 SSTI abuse, and Flask-based web application compromise within a Docker environment.</description>
      
    </item>
    
  </channel>
</rss>
