Famous for detailed walkthroughs of Capture The Flag challenges and Hack The Box machines, breaking down each step methodically for learners ([securityboulevard.com](https://securityboulevard.com/2023/07/10-best-cybersecurity-youtube-channels-of-2023/#:~:text=9,and%20Hack%20The%20Box%20Machines)).

The HackTheBox "Guardian" walkthrough demonstrates a full‑stack penetration test, starting with network scanning and sub‑domain discovery that revealed a default credential (GU1234). Attackers leveraged FFUF to brute‑force accounts, accessed a chat feature, and uncovered a Gitea instance where the public API disclosed valid usernames. By downloading the portal source, the team identified a PHP Spreadsheet XSS flaw, crafted a CSRF payload, and exploited an LFI chain to gain a shell, later cracking a salted hash and achieving remote code execution through a misconfigured Apache wrapper. The final stages involved abusing Apache Include directives and configuration files to read arbitrary files and run the web server as root, granting full system control.

The video walks through the Hack The Box “GiveBack” challenge, showing how a seemingly ordinary WordPress site can be leveraged to gain full control of a Kubernetes‑hosted environment. The presenter first discovers that the site runs an outdated Give plugin (v3.14.0)...

The video walks through the Hack The Box “Soulmate” challenge, emphasizing a disciplined, multitasked reconnaissance approach rather than a straight‑to‑code‑execution mindset. Ipsac begins with an Nmap sweep, discovers only SSH and HTTP, then adds a host entry for soulmate.htb and...

The video walks through solving the HackTheBox "Signed" machine, an assumed‑breach challenge centered on a Microsoft SQL Server 2022 instance. Starting with default credentials, the presenter demonstrates initial enumeration, discovers that the guest account lacks XP cmd shell privileges, and pivots to...

The video walks through the Hack The Box "Imagery" machine, a Flask‑based web application exposing a gallery, login, and bug‑report functionality. The presenter begins with standard port scanning, identifies HTTP on port 8000, and confirms the service runs WorkZug on...

The video walks viewers through the Hack The Box “WhiteRabbit” machine, beginning with a standard Nmap scan that reveals three open ports: SSH on 22, HTTP on 80 served by Caddy, and a secondary SSH on 2222 likely running inside...