HackTheBox Endgames - Complete Walkthroughs
Multi-machine, multi-stage scenarios simulating real penetration testing engagements. Each endgame contains multiple flags across an interconnected network.
1. P.O.O. (Professional Offensive Operations)
| Difficulty: Easy-Medium | Hosts: 2 Windows | Flags: 5 |
Overview
The first Endgame released by HTB. Two Windows hosts presented behind a single public-facing IP. Focuses on web enumeration, MSSQL exploitation, and linked server abuse.
Attack Chain
- Recon: Discover DS_STORE files and IIS short filenames (8.3 naming) to enumerate hidden paths
- Credential Discovery: Find MSSQL database connection string through tricky file enumeration
- MSSQL Exploitation: Connect to MSSQL instance with discovered credentials
- Linked Server Abuse: Exploit trust relationships between MSSQL linked servers to escalate access
- Code Execution: Abuse linked server trust to achieve command execution on the second host
Key Techniques
- DS_STORE file enumeration
- IIS 8.3 short filename brute-forcing
- MSSQL enumeration (roles, grants, proxy accounts)
- MSSQL linked server exploitation
- Trust abuse between database servers
Writeup Resources
2. Xen
| Difficulty: Medium-Hard | Hosts: 6 (3 Windows workstations, 1 Netscaler/FreeBSD, 1 Citrix Windows, 1 Domain Controller) | Flags: 5+ |
Overview
Test enumeration, breakout, lateral movement, and privilege escalation within a small Active Directory environment behind a Citrix virtual desktop.
Attack Chain
- Phishing: Social engineer/phish credentials from users in the Sales department
- Citrix Breakout: Use phished credentials to access Citrix VDI environment, then escape the restricted desktop
- Workstation Compromise: Privilege escalation on 3 end-user Windows computers
- Lateral Movement: Move through the network using harvested credentials
- Domain Compromise: Kerberoasting, credential extraction, DC takeover
Key Techniques
- Social engineering / credential phishing
- Citrix virtual desktop breakout
- Windows local privilege escalation
- Kerberoasting
- Active Directory enumeration and exploitation
- Domain Controller compromise
Writeup Resources
- 0xdf Writeup
- morph3sec Writeup
- sinfulz Walkthrough (Medium)
- PuckieStyle Writeup
- dmw0ng Writeup (BirdsArentReal)
3. Hades
| Difficulty: Hard | Hosts: Multiple (small AD enterprise network) | Flags: 5+ |
Overview
Put your Active Directory enumeration and exploitation, lateral movement, and privilege escalation skills to the test within a small enterprise network. The goal is to gain a foothold, escalate privileges, and ultimately compromise the domain.
Attack Chain
- Chasm (Initial Access): Enumerate external services, find entry point
- Guardian: AS-REP Roasting to obtain crackable hashes
- Lateral Movement: Exploit Printer Bug from Linux, decrypt DPAPI secrets
- Delegation Abuse: Kerberos Resource-Based Constrained Delegation (RBCD)
- DNS Spoofing: Spoof Active Directory-Integrated DNS for further access
- Domain Compromise: Full domain takeover
Key Techniques
- AS-REP Roasting
- Printer Bug exploitation (from Linux)
- DPAPI secret decryption
- Kerberos Resource-Based Constrained Delegation (RBCD)
- Active Directory-Integrated DNS spoofing
- Multi-stage lateral movement
Writeup Resources
4. RPG
| Difficulty: Hard | Hosts: Multiple | Flags: 6 |
Overview
A challenging multi-machine scenario focused on Linux exploitation, network pivoting, and advanced techniques.
Flag Stages
- “Would You Like to Play a Game?” - Initial access
- “Sword and Mind” - Enumeration and exploitation
- “One’s Act, One’s Profit” - Lateral movement
- “The Source of Power” - Privilege escalation
- “Wake From Death and Turn to Life” - Advanced exploitation
- “Collapse of the Empire” - Final domain/network compromise
Key Techniques
- Multi-machine network pivoting
- Linux service exploitation
- Advanced enumeration
- Chained exploitation across hosts
- Final domain compromise
Writeup Resources
5. Ascension
| Difficulty: Hard | Hosts: Multiple | Flags: 7 |
Overview
An advanced endgame involving network enumeration, web application attacks, Active Directory hacking, and Windows privilege escalation.
Flag Stages
- Takeoff - Database enumeration (roles, grants, proxy accounts)
- Intercept - Capturing credentials/traffic
- Contrails - Lateral movement
- Wingman - Privilege escalation
- Corridor - Pivoting
- Upgrade - Advanced exploitation
- Maverick - Final compromise
Key Techniques
- Blind SQL injection
- MSSQL exploitation and agent jobs
- MSSQL proxy abuse
- Network pivoting
- Resource-Based Constrained Delegation (RBCD)
- Multi-stage Active Directory attacks
Writeup Resources
Endgame Progression Path
P.O.O. (Beginner) --> Xen (Intermediate) --> Hades (Advanced) --> RPG (Advanced) --> Ascension (Advanced)
| Endgame | Focus | Prerequisite Skills |
|---|---|---|
| P.O.O. | MSSQL, Web Enum | Basic web, SQL knowledge |
| Xen | Citrix, AD Basics | AD fundamentals, social engineering |
| Hades | AD Advanced | Kerberos, DPAPI, delegation attacks |
| RPG | Linux Networks | Linux exploitation, pivoting |
| Ascension | Full-spectrum AD | SQLi, MSSQL, RBCD, pivoting |