13 posts tagged with "Protocols"
Internet protocols, such as TCP/IP (Transmission Control Protocol/Internet Protocol), are standardized rules that govern how data is transmitted and routed across the internet, enabling communication between different devices and networks.
View All TagsHTB | Blue | Write-Up
Summary:
We spawn a target machine, then perform reconnaissance to gather initial information about its services and vulnerabilities. We identify an SMB vulnerability, which we investigate further by searching for applicable exploits (specifically CVE-2017-0144).
Using this knowledge, we configure an exploit with Metasploit to take advantage of the discovered vulnerability. Next, we verify the vulnerability's presence using Metasploit's capabilities. With the exploit confirmed, we run it against the target machine, leveraging its SMB vulnerability to gain access. We then proceed to grab both the user flag and root flag, ultimately achieving System Own status once these tasks are accomplished.
Machine Name: Blue | Difficulty: Easy | OS: Windows
HTB | Netmon | Write-Up
Summary:
We navigate the Hack The Box website starting by spawning a target machine. Next, we perform reconnaissance on the target to gather initial information and identify an FTP server running on it. We use anonymous authentication to access the FTP share, then enumerate the files available on this share.
Continuing our investigation, we access the NETMON configuration files and extract user credentials from them. Modifying these credentials to suit our needs, we proceed to access the PRTG Network Monitor web interface. Utilizing Metasploit's capabilities, we exploit CVE-2018-9276 to gain shell access with the "LocalSystem" account, thereby achieving system level access. With this access in hand, we grab both the user flag and root flag, ultimately declaring System Own status once these tasks are accomplished.
Machine Name: Netmon | Difficulty: Easy | OS: Windows
HTB | Included | Write-Up
Summary:
We test connectivity and scan the target, then enumerate its TFTP service and web page. We find an unauthenticated upload function on TFTP and a Local File Inclusion (LFI) vulnerability on the web page. We use these to upload a PHP reverse shell and gain low-level access via LFI.
With this foothold, we upgrade our access to user level using the acquired clear-text credentials. We then grab the user flag, enumerate further, and exploit privilege escalation opportunities to reach root level access with the help of the lxdprivesc script. Finally, we obtain the root flag.
Machine Name: Included | Difficulty: Easy | OS: Linux
HTB | Vaccine | Write-Up
Summary:
We test connectivity and scan the target, then use anonymous FTP access to download and crack a zip archive using John the Ripper. Analyzing the source code and exploiting a hardcoded hash gives us web app access via compromised credentials.
We identify an SQL injection vulnerability, gain control, and upgrade to a reverse shell with low-privileged access. As we enumerate the machine, we find privilege escalation opportunities and exploit SUDO vulnerabilities to gain root access, ultimately obtaining both user and root flags.
Machine Name: Vaccine | Difficulty: Easy | OS: Linux
HTB | Archetype | Write-Up
Summary:
This article guides users through completing the Archetype machine challenge on Hack The Box. We exploit vulnerabilities on a Microsoft SQL Server by enumerating SMB shares, finding clear text credentials, and using Impacket to authenticate and gain an authorized connection. We then escalate privileges and download Netcat to establish a reverse shell, grab the user flag, and eventually use Impacket's psexec tool to gain admin access and retrieve the root flag before terminating the connection.
Machine Name: Archetype | Difficulty: Easy | OS: Windows
HTB | Tactics | Write-Up
Summary:
This walkthrough provides step-by-step guidance on how to solve the Tactics machine challenge on Hack The Box, focusing on completing Tier 1 Starting Point challenges. The guide covers various tasks and techniques using Nmap, SMB protocols, and Impacket tools to ultimately obtain the root flag and "pwn" the target machine.
Machine Name: Tactics | Difficulty: Easy | OS: Windows
HTB | Responder | Write-Up
Summary:
This walkthrough outlines the attack vector used to system access on the Responder machine on Hack The Box, where an attacker would exploit the NetBIOS vulnerability to capture NTLMv2 hashes, which are then cracked using John the Ripper to obtain valid credentials. These credentials can be leveraged to ultimately gain access to root flag on the target machine.
Machine Name: Responder | Difficulty: Easy | OS: Windows
HTB | Crocodile | Write-Up
Summary:
This walkthrough provides help solving the Crocodile machine on Hack The Box. The guide covers various topics, including Nmap scanning, service version identification, FTP login procedures, and directory brute force using Gobuster.
Machine Name: Crocodile | Difficulty: Easy | OS: Linux
HTB | Synced | Write-Up
Summary:
This walkthrough provides help with solving the Synced machine challenge on Hack The Box, focusing on tasks related to rsync and its usage on the target machine. Key takeaways include understanding the default port for rsync (873), using anonymous authentication, and listing shares and files with the correct options.
Machine Name: Synced | Difficulty: Easy | OS: Linux
HTB | Dancing | Write-Up
Summary:
This article guides users through completing the Dancing machine challenge on Hack The Box. It covers tasks related to SMB, such as listing shares, accessing shares with a blank password, and downloading files using the SMB shell. The final step is to find and submit the root flag.
Machine Name: Dancing | Difficulty: Easy | OS: Windows
HTB | Fawn | Write-Up
Summary:
This article guides users through completing the Fawn machine challenge on Hack The Box. It covers identifying & using an anonymous FTP service to access and download the "root flag".
Machine Name: Fawn | Difficulty: Easy | OS: Linux
HTB | Meow | Write-Up
Summary:
This article guides users through completing the Meow machine challenge on Hack The Box. It covers identifying & exploiting telnet credentials, gaining root access, and submitting the root flag by reading "flag.txt".
Machine Name: Meow | Difficulty: Easy | OS: Linux