<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Writeups de Boxes on Heretek</title>
    <link>https://heretek.dev/pt/writeups/</link>
    <description>Recent content in Writeups de Boxes on Heretek</description>
    <image>
      <title>Heretek</title>
      <url>https://heretek.dev/og-image.png</url>
      <link>https://heretek.dev/og-image.png</link>
    </image>
    <generator>Hugo</generator>
    <language>pt</language>
    <lastBuildDate>Sat, 28 Mar 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://heretek.dev/pt/writeups/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>HTB Certified Writeup — Shadow Credentials, ACL Chains &amp; ADCS ESC9 (2026)</title>
      <link>https://heretek.dev/pt/writeups/htb-certified/</link>
      <pubDate>Sat, 28 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://heretek.dev/pt/writeups/htb-certified/</guid>
      <description>Box AD assumed breach. Abuso de WriteOwner num grupo, double shadow credentials chain, e abuso de certificado ADCS ESC9 até Domain Admin.</description>
    </item>
    <item>
      <title>HTB Active Writeup — Kerberoasting &amp; GPP Passwords (2026)</title>
      <link>https://heretek.dev/pt/writeups/htb-active/</link>
      <pubDate>Tue, 24 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://heretek.dev/pt/writeups/htb-active/</guid>
      <description>Minha primeira box AD. Null session no SMB -&amp;gt; senha GPP no SYSVOL -&amp;gt; Kerberoasting do Administrator -&amp;gt; Domain Admin.</description>
    </item>
    <item>
      <title>HTB Blackfield Writeup — LSASS Dump &amp; VSS Shadow Copies (2026)</title>
      <link>https://heretek.dev/pt/writeups/htb-blackfield/</link>
      <pubDate>Tue, 24 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://heretek.dev/pt/writeups/htb-blackfield/</guid>
      <description>Box AD Hard. AS-REP Roasting -&amp;gt; BloodHound -&amp;gt; ForceChangePassword -&amp;gt; lsass.DMP -&amp;gt; SeBackupPrivilege -&amp;gt; VSS snapshot -&amp;gt; NTDS.dit -&amp;gt; Domain Admin.</description>
    </item>
    <item>
      <title>HTB Forest Writeup — AS-REP Roasting, BloodHound &amp; DCSync (2026)</title>
      <link>https://heretek.dev/pt/writeups/htb-forest/</link>
      <pubDate>Tue, 24 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://heretek.dev/pt/writeups/htb-forest/</guid>
      <description>Segunda box AD. AS-REP Roasting sem creds, caminho de ataque no BloodHound por 5 grupos nested, ACL abuse até DCSync.</description>
    </item>
    <item>
      <title>HTB Monteverde Writeup — Azure AD Connect Exploit (2026)</title>
      <link>https://heretek.dev/pt/writeups/htb-monteverde/</link>
      <pubDate>Tue, 24 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://heretek.dev/pt/writeups/htb-monteverde/</guid>
      <description>Box Active Directory — password spraying -&amp;gt; extração de credenciais do Azure AD Connect -&amp;gt; Domain Admin.</description>
    </item>
    <item>
      <title>HTB Querier Writeup — Exploração MSSQL (2026)</title>
      <link>https://heretek.dev/pt/writeups/htb-querier/</link>
      <pubDate>Tue, 24 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://heretek.dev/pt/writeups/htb-querier/</guid>
      <description>Acesso guest no SMB -&amp;gt; macro Excel com creds MSSQL -&amp;gt; roubo de hash via Responder com xp_dirtree -&amp;gt; xp_cmdshell -&amp;gt; reverse shell.</description>
    </item>
    <item>
      <title>PG Algernon Writeup — SmarterMail Deserialization RCE (2026)</title>
      <link>https://heretek.dev/pt/writeups/pg-algernon/</link>
      <pubDate>Tue, 24 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://heretek.dev/pt/writeups/pg-algernon/</guid>
      <description>Box Proving Grounds — FTP anônimo, SmarterMail numa porta estranha, .NET deserialization RCE direto pra SYSTEM. Sem privesc necessário.</description>
    </item>
  </channel>
</rss>
