Tag: htb

  • 💻 Mirai – Writeup

    Default credentials we’ll be used on this machine to access it. Add the IP address in /etc/hosts: … 10.10.10.48 mirai.htb … First run a nmap scan: A lot of ports are open contrary to the other easy boxes. Let’s start with the website: It tells us that the machine is a Pi-hole version 3.1.4. We…

    Lire plus: 💻 Mirai – Writeup
  • 💻 Legacy – Writeup

    We’ll use a very famous CVE vulnerability to exploit this machine. Add the IP address in /etc/hosts: … 10.10.10.4 legacy.htb … First run a nmap scan: Only 2 ports seem interesting: 139 and 445 which are SMB ports. We can run some enumeration on them: We got some data but nothing really useful. smbclientdoesn’t return…

    Lire plus: 💻 Legacy – Writeup
  • 💻 Lame – Writeup

    We’ll try to gain root access to the easiest HTB machine. Add the IP address in /etc/hosts: … 10.10.10.3 lame.htb … First run a nmap scan: There are 4 open ports (port 3622 is a false positive): FTP: Anonymous login is allowed, meaning we can connect to it without any password. We can also check…

    Lire plus: 💻 Lame – Writeup
  • 💻 Knife – Writeup

    A backdoor is found on the web server of this machine. Add the IP address in /etc/hosts: … 10.10.10.242 knife.htb … First run a nmap scan: The website doesn’t give us anything useful: In the source code there is no link. Looking at Wappalyzer we get some versions: Apache 2.4.41 PHP 8.1.0 There is no…

    Lire plus: 💻 Knife – Writeup
  • 💻 Jerry – Writeup

    We’ll exploit a Tomcat functionnality to become Administrator of this Windows machine. Add the IP address in /etc/hosts: … 10.10.10.95 jerry.htb … First run a nmap scan: There is only one port open: We can search on Google for an exploit related to this version: There’s an ExploitDB exploit for this version. Let’s see if…

    Lire plus: 💻 Jerry – Writeup
  • 💻 Granny – Writeup

    This Windows machine looks a lot like another machine… Add the IP address in /etc/hosts: … 10.10.10.15 granny.htb … First run a nmap scan: We can run a directory fuzzing but nothing interesting is found: Here is the only page accessible on the website: This is a webdav server and there is a tool to…

    Lire plus: 💻 Granny – Writeup
  • 💻 Grandpa – Writeup

    In this machine we’ll exploit a kernel vulnerability to become Administrator. Add the IP address in /etc/hosts: … 10.10.10.14 grandpa.htb … First run a nmap scan: There is only one port open which is an HTTP service on port 80. It is detected as being a Windows machine running Microsoft IIS httpd 6.0. We can…

    Lire plus: 💻 Grandpa – Writeup
  • 💻 Explore – Writeup

    During this easy Android machine, we’ll exploit a known CVE. Add the IP address in /etc/hosts: … 10.10.10.247 explore.htb … First run a nmap scan: I cut a part of the output because the rest was garbage. The SSH banner, gives us a good hint to find the Android product: Banana Studio. A quick search…

    Lire plus: 💻 Explore – Writeup
  • 💻 Devel – Writeup

    In this easy Windows machine, we’ll exploit a misconfiguration to become Administrator. Add the IP address in /etc/hosts: … 10.10.10.5 devel.htb … First run a nmap scan: Default web page: There is a FTP server running on port 21. We can connect to it as anonymous user. There is nothing interesting on it but we…

    Lire plus: 💻 Devel – Writeup
  • 💻 Cap – Writeup

    The name of the easy Linux box gives us useful hints… Add the hostname into /etc/hosts: … 10.10.10.245 cap.htb … First run a nmap scan to detect open ports: The nmap scan output is way too long so we’ll just focus on the important parts. The FTP server is not accessible using anonymous login and…

    Lire plus: 💻 Cap – Writeup