
Welcome to the Writeups section of CubitBlog — a collection of detailed walkthroughs, notes, and techniques gathered from hours spent exploring Hack The Box, CTF challenges, and real-world pentesting scenarios.
Here you’ll find:
- Step-by-step breakdowns of HTB boxes
- Notes on enumeration, exploitation, and privilege escalation
- Reflections, dead ends, and the “why” behind each step
Whether you’re stuck on a box or just enjoy reading through the process, I hope these writeups offer clarity, inspiration, or at least a new trick to try on your next challenge.