HTB CBBH Report
HTB CBBH Report
Report of Findings
HTB Certified Bug Bounty Hunter (CBBH) Exam Report
CONFIDENTIAL
HACKTHEBOX
Table of Contents
1 Statement of Confidentiality .................................................................... 3
A Appendix ..................................................................................................... 9
A.1 Flags Discovered ....................................................................................................... 9
1 Statement of Confidentiality
The contents of this document have been developed by Hack The Box. Hack The Box considers the
contents of this document to be proprietary and business confidential information. This information is
to be used only in the performance of its intended use. This document may not be released to another
vendor, business partner or contractor without prior written consent from Hack The Box. Additionally,
no portion of this document may be communicated, reproduced, copied or distributed without the
prior consent of Hack The Box.
The contents of this document do not constitute legal advice. Hack The Box’s offer of services that
relate to compliance, litigation or other legal interests are not intended as legal counsel and should
not be taken as such. The assessment detailed herein is against a fictional company for training and
examination purposes, and the vulnerabilities in no way affect Hack The Box external or internal
infrastructure.
2 Engagement Contacts
TODO Customer Contacts
Contact Title Contact Email
Assessor Contact
Assessor Name Title Assessor Contact Email
TODO Candidate Name TODO Candidate Title TODO Candidate Email
3 Executive Summary
TODO Customer Ltd. (“TODO Customer” herein) invited TODO Candidate Name to a private bug
bounty program to perform a targeted Web Application Penetration Test of TODO Customer’s
externally facing web applications to identify high-risk security weaknesses, determine the impact to
TODO Customer, document all findings in a clear and repeatable manner, and provide remediation
recommendations. The following types of findings were in-scope for this private bug bounty program:
The following types of activities were considered out-of-scope for this bug bounty program:
TODO Candidate Name performed testing under a “Black Box” approach from , to without credentials
or any advance knowledge of TODO Customer’s web applications with the goal of identifying unknown
weaknesses. Testing was performed from a non-evasive standpoint with the goal of uncovering as
many misconfigurations and vulnerabilities as possible. Testing was performed remotely. Each
weakness identified was documented and manually investigated to determine exploitation
possibilities and escalation potential. TODO Candidate Name sought to demonstrate the full impact of
every vulnerability, up to and including internal network access.
3.1 Approach
3.2 Scope
The scope of this assessment was as follows TODO *.tricolor.local and any and all open web server
ports discovered on the target IP address provided at the start of the assessment.
In Scope Assets
Host/URL/IP Address Description
TODO www.triclor.local Main Tricolor website/unauthenticated
TODO exam IP address PR website/unauthenticated
TODO exam IP address Jobs Portal/unauthenticated
TODO exam IP address HR website/unauthenticated
TODO exam IP address Tricolor online store/unauthenticated
Below is a high-level overview of each finding identified during testing. These findings are covered in
depth in the Technical Findings Details section of this report.
Finding Evidence
ADD COMMAND OUTPUT AS APPROPRIATE
A Appendix
A.1 Flags Discovered
Flag
Application Flag Value Flag Location Method Used
#
TODO TODO HTB RANDOM TODO Web TODO Command Injection
1.
HOSTNAME VALUE root (example)
2.
3.
4.
5.
6.
7.
8.
9.
10.
End of Report