Eloquia — HackTheBox Insane Walkthrough

Eloquia is an Insane-rated Windows box built around a Django blogging platform and a companion Google-parody OAuth provider. The kill chain is long and surgical: steal an admin session via AngularJS CSTI, exploit SQLite’s VACUUM INTO and load_extension() for code execution, recover credentials from Edge’s encrypted storage, then ride a writable .NET service config to SYSTEM.

Prerequisites: This walkthrough assumes familiarity with AngularJS Client-Side Template Injection (CSTI), Django admin internals, SQLite’s advanced pragma/extension system, OAuth 2.0 authorization code flows, Windows DPAPI credential decryption, and .NET AppDomainManager hijacking. If any of those are new to you, this box will be a rough introduction — consider working through some Hard-rated boxes first.


Overview

Two open ports. One hostname hint from a redirect. Enormous attack surface hidden inside a polished web app. The box teaches you that “Insane” difficulty isn’t about a single clever trick — it’s about six or seven medium-difficulty steps that each depend on the one before. Miss any link in the chain and you’re stuck.


Full Writeup

The detailed walkthrough is encrypted while this box is active on HackTheBox.
Enter the root flag to unlock the full writeup.

Incorrect flag. Try again.