<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>HTB Audit Log on Ghost-Hydra Intelligence</title><link>https://JoseMariaMicoli.github.io/htb-reports/</link><description>Recent content in HTB Audit Log on Ghost-Hydra Intelligence</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Sun, 25 Jan 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://JoseMariaMicoli.github.io/htb-reports/index.xml" rel="self" type="application/rss+xml"/><item><title>HTB Imagery Pentest Report</title><link>https://JoseMariaMicoli.github.io/htb-reports/imagery/pentest/</link><pubDate>Sun, 25 Jan 2026 00:00:00 +0000</pubDate><guid>https://JoseMariaMicoli.github.io/htb-reports/imagery/pentest/</guid><description>&lt;h1 id="penetration-testing"&gt;PENETRATION TESTING&lt;/h1&gt;
&lt;p&gt;&lt;strong&gt;Target:&lt;/strong&gt; Imagery (10.129.21.11)&lt;br&gt;
&lt;strong&gt;Date:&lt;/strong&gt; February 07, 2026&lt;br&gt;
&lt;strong&gt;Auditor:&lt;/strong&gt; Jose Maria Micoli
&lt;strong&gt;Classification:&lt;/strong&gt; &lt;strong&gt;CONFIDENTIAL / RESTRICTED&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Audit ID:&lt;/strong&gt; IMG-2026-02-07-001&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id="1-executive-summary"&gt;1. Executive Summary&lt;/h2&gt;
&lt;p&gt;A rigorous forensic audit and penetration test was conducted against the &lt;strong&gt;Imagery&lt;/strong&gt; infrastructure (10.129.21.11). The assessment successfully identified and exploited a chain of critical vulnerabilities resulting in full System Administrator (Root) compromise.&lt;/p&gt;
&lt;p&gt;The attack vector began with &lt;strong&gt;Stored Cross-Site Scripting (XSS)&lt;/strong&gt; in the administrative ticketing system, leading to &lt;strong&gt;Session Hijacking&lt;/strong&gt;. Administrative access facilitated &lt;strong&gt;Local File Inclusion (LFI)&lt;/strong&gt;, exposing the application&amp;rsquo;s entire source code and sensitive configuration files. Source code analysis revealed an &lt;strong&gt;Authenticated Remote Code Execution (RCE)&lt;/strong&gt; vulnerability in the image processing logic (&lt;code&gt;ImageMagick&lt;/code&gt;), which was exploited to gain a foothold as the &lt;code&gt;web&lt;/code&gt; user.&lt;/p&gt;</description></item><item><title>HTB Imagery Walkthrough</title><link>https://JoseMariaMicoli.github.io/htb-reports/imagery/walkthrough/</link><pubDate>Sun, 25 Jan 2026 00:00:00 +0000</pubDate><guid>https://JoseMariaMicoli.github.io/htb-reports/imagery/walkthrough/</guid><description>&lt;h1 id="hackthebox-walkthrough-imagery"&gt;HackTheBox Walkthrough: Imagery&lt;/h1&gt;
&lt;p&gt;Welcome to the walkthrough for &lt;strong&gt;Imagery&lt;/strong&gt;, a machine that tests our ability to chain web vulnerabilities, analyze source code for secure coding errors, and perform forensic-style enumeration to move laterally.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Difficulty:&lt;/strong&gt; Medium/Hard&lt;br&gt;
&lt;strong&gt;Target IP:&lt;/strong&gt; 10.129.21.11&lt;br&gt;
&lt;strong&gt;OS:&lt;/strong&gt; Linux&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id="1-executive-summary-tldr"&gt;1. Executive Summary (TL;DR)&lt;/h2&gt;
&lt;p&gt;Our journey begins with a stored Cross-Site Scripting (XSS) vulnerability in a bug reporting system, which we leverage to hijack an administrator&amp;rsquo;s session. With administrative access, we discover a Local File Inclusion (LFI) flaw, allowing us to dump the application&amp;rsquo;s source code and database.&lt;/p&gt;</description></item></channel></rss>