- Published on
Cozy Hosting
- Authors

- Name
- Dave Taylor
Summary
Short summary of the HTB box and your approach.
Steps
- Enumeration
- Exploitation
- Privilege Escalation
Artifacts
- HTTP requests, payloads, exploit scripts
Short summary of the HTB box and your approach.