<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>htb on </title>
    <link>https://b1872f9d.camati-site.pages.dev/tags/htb/</link>
    <description>Recent content in htb on </description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-us</language>
    <lastBuildDate>Sun, 19 Apr 2026 17:36:49 -0300</lastBuildDate><atom:link href="https://b1872f9d.camati-site.pages.dev/tags/htb/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Case Study 08 HTB Write-up Holmes 2025 5: The Payload Write-up Challenge</title>
      <link>https://b1872f9d.camati-site.pages.dev/posts/case-study-08/</link>
      <pubDate>Sun, 19 Apr 2026 17:36:49 -0300</pubDate>
      
      <guid>https://b1872f9d.camati-site.pages.dev/posts/case-study-08/</guid>
      <description>Holmes 2025 5: The Payload Write-up Description This is my write-up for the Sherlock Challange completed on 04/12 in the HTB challanges, bellow are my answers for the challange and how i got each flag.
Goal Analyze a stealthy malware sample that silently propagates across systems. Your task is to uncover its hidden logic, understand how it maintains persistence, and reveal the secret it’s designed to protect.
Scenario With the malware extracted, Holmes inspects its logic.</description>
    </item>
    
    <item>
      <title>Case Study 07 - HTB Write-up HookFlare Challenge</title>
      <link>https://b1872f9d.camati-site.pages.dev/posts/case-study-07/</link>
      <pubDate>Sat, 28 Mar 2026 15:12:59 -0300</pubDate>
      
      <guid>https://b1872f9d.camati-site.pages.dev/posts/case-study-07/</guid>
      <description>Introduction In this blog post I will show how I solved the Sherlocks Hijacked challenge in HTB about DFIR1 and mobile malware (android).
The description of the challenge is the following:
A S1rBank client reported unauthorized transactions. The victim received an SMS urging a banking app update via a link, which installed a dormant app mimicking the bank’s official version. Once activated, it stole credentials, bypassed 2FA via SMS interception, and exfiltrated data.</description>
    </item>
    
    <item>
      <title>Case Study 06 - HTB Write-up Hijacked Challenge</title>
      <link>https://b1872f9d.camati-site.pages.dev/posts/case-study-06/</link>
      <pubDate>Sat, 27 Dec 2025 09:19:28 -0300</pubDate>
      
      <guid>https://b1872f9d.camati-site.pages.dev/posts/case-study-06/</guid>
      <description>HackTheBox Hijacked Challenge - Sherlocks forensics Introduction In this blog post I will show how I solved the Sherlocks Hijacked challenge in HTB about DFIR1 and memory forensics.
The description of the challenge is the following: Happy Grunwald, the CEO of Forela, decided to expand the company&amp;rsquo;s business in Lahore, Pakistan, and brought along his IT Administrator, Alonzo Spire, to help set up the new office and ensure the company&amp;rsquo;s IT infrastructure was running smoothly.</description>
    </item>
    
    <item>
      <title>Case Study 05 - HTB Write-up CrewCrow Challenge</title>
      <link>https://b1872f9d.camati-site.pages.dev/posts/case-study-05/</link>
      <pubDate>Sat, 27 Sep 2025 20:21:34 -0300</pubDate>
      
      <guid>https://b1872f9d.camati-site.pages.dev/posts/case-study-05/</guid>
      <description>HackTheBox CrewCrow Challenge - Sherlocks forensics Introduction In this blog post I will show how I solved the Sherlocks CrewCrow challange in HTB about DFIR1, cryptography and Zoom app enumeration.
The description of the challenge is the following:
The Cyber Crime Investigation Unit (CCIU) has been tracking a famous cybercriminal organization known as &amp;ldquo;CrewCrow&amp;rdquo; for several years. The group is responsible for numerous high-profile cyber-attacks, targeting financial institutions, government agencies, and private corporations worldwide.</description>
    </item>
    
  </channel>
</rss>
