Welcome to the Writeups section of CubitBlog — a collection of detailed walkthroughs, notes, and techniques gathered from hours spent exploring Hack The Box, CTF challenges, and real-world pentesting scenarios.

Here you’ll find:

  • Step-by-step breakdowns of HTB boxes
  • Notes on enumeration, exploitation, and privilege escalation
  • Reflections, dead ends, and the “why” behind each step

Whether you’re stuck on a box or just enjoy reading through the process, I hope these writeups offer clarity, inspiration, or at least a new trick to try on your next challenge.