<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Writeups de Boxes on Heretek</title>
    <link>https://heretek.dev/es/writeups/</link>
    <description>Recent content in Writeups de Boxes on Heretek</description>
    <image>
      <title>Heretek</title>
      <url>https://heretek.dev/og-image.png</url>
      <link>https://heretek.dev/og-image.png</link>
    </image>
    <generator>Hugo</generator>
    <language>es</language>
    <lastBuildDate>Sat, 28 Mar 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://heretek.dev/es/writeups/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>HTB Certified Writeup — Shadow Credentials, ACL Chains y ADCS ESC9 (2026)</title>
      <link>https://heretek.dev/es/writeups/htb-certified/</link>
      <pubDate>Sat, 28 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://heretek.dev/es/writeups/htb-certified/</guid>
      <description>Box AD con assumed breach. WriteOwner abuse en un grupo, doble cadena de shadow credentials, y ADCS ESC9 certificate abuse hasta Domain Admin.</description>
    </item>
    <item>
      <title>HTB Active Writeup — Kerberoasting y GPP Passwords (2026)</title>
      <link>https://heretek.dev/es/writeups/htb-active/</link>
      <pubDate>Tue, 24 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://heretek.dev/es/writeups/htb-active/</guid>
      <description>Mi primera box de AD. Null session en SMB → GPP password en SYSVOL → Kerberoasting al Administrator → Domain Admin.</description>
    </item>
    <item>
      <title>HTB Blackfield Writeup — LSASS Dump y VSS Shadow Copies (2026)</title>
      <link>https://heretek.dev/es/writeups/htb-blackfield/</link>
      <pubDate>Tue, 24 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://heretek.dev/es/writeups/htb-blackfield/</guid>
      <description>Box AD difícil. AS-REP Roasting → BloodHound → ForceChangePassword → lsass.DMP → SeBackupPrivilege → VSS snapshot → NTDS.dit → Domain Admin.</description>
    </item>
    <item>
      <title>HTB Forest Writeup — AS-REP Roasting, BloodHound y DCSync (2026)</title>
      <link>https://heretek.dev/es/writeups/htb-forest/</link>
      <pubDate>Tue, 24 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://heretek.dev/es/writeups/htb-forest/</guid>
      <description>Segunda box de AD. AS-REP Roasting sin creds, ruta de ataque en BloodHound a través de 5 grupos anidados, ACL abuse hasta DCSync.</description>
    </item>
    <item>
      <title>HTB Monteverde Writeup — Exploit de Azure AD Connect (2026)</title>
      <link>https://heretek.dev/es/writeups/htb-monteverde/</link>
      <pubDate>Tue, 24 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://heretek.dev/es/writeups/htb-monteverde/</guid>
      <description>Box de Active Directory — password spraying → extracción de credenciales de Azure AD Connect → Domain Admin.</description>
    </item>
    <item>
      <title>HTB Querier Writeup — Explotación de MSSQL (2026)</title>
      <link>https://heretek.dev/es/writeups/htb-querier/</link>
      <pubDate>Tue, 24 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://heretek.dev/es/writeups/htb-querier/</guid>
      <description>SMB guest access → macro de Excel con creds de MSSQL → Responder hash steal via xp_dirtree → xp_cmdshell → reverse shell.</description>
    </item>
    <item>
      <title>PG Algernon Writeup — SmarterMail Deserialization RCE (2026)</title>
      <link>https://heretek.dev/es/writeups/pg-algernon/</link>
      <pubDate>Tue, 24 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://heretek.dev/es/writeups/pg-algernon/</guid>
      <description>Box de Proving Grounds — FTP anónimo, SmarterMail en un puerto raro, .NET deserialization RCE directo a SYSTEM. Sin privesc necesario.</description>
    </item>
  </channel>
</rss>
