Automating HTB Exploits: LLM-Driven N8n Agent's Hacking Ability

(luciuswayne.com)

1 points | by Vandolin 14 hours ago ago

1 comments

  • Vandolin 14 hours ago

    I built a modular n8n workflow that uses an LLM as its “decision engine” to enumerate, triage, and exploit an HTB “Editor” box end-to-end — from a single input to flag extraction. In my write-up, I walk through challenges like ephemeral shells, hallucinated commands, orchestration pitfalls, and verification logic.