-
Tactics – Hack The Box
This box was mostly focused on Windows’s SMB and the two pathways of exploitation to capture the flag. I was exposed to Impacket’s psexec.py tool within the Impacket Python library which provides an easy-to-use CLI for executing commands remotely on Windows systems using the SMB protocol. NMAP I began with a usual nmap scan and…
-
Pennyworth – Hack The Box
This box was particularly easy as the only roadblock was understanding that the credentials for the login page of Jenkins were a combination of usually used default credentials: root: password. From then on, I looked up Jenkins Script Console vulnerabilities and found out there is a script that can act as a reverse shell which…
-
Funnel – Hack The Box
I began this box by keeping in mind that the tags for this machine were FTP and PostgreSQL. Other tags included: #Reconnaissance #Tunneling #Password Spraying #Port Forwarding #Anonymous/Guest Access #Clear Text Credentials. The objective was straight-forward, obtain the flag from the PostgreSQL server and submit it. The challenge was in first logging in as an…
-
Bike – Hack The Box
This box was part of Tier 1 from the Starting Point Module and it involved performing some operations within BurpSuite to be able to access the root flag. This was a good learning curve as I had not been exposed to BurpSuite in a practical way up until to recently neither how to set it…
-
Three – Hack The Box
This box, part of Tier 1 from the Starting Point Module, was quite fun to pentest as it had offered me some challenges like Cloud, AWS in particular. My task was to get the flag by first uploading a reverse shell into the AWS bucket list from the terminal by using the appropriate flags for…
-
Reponder – Hack The Box
This machine is part of the new “Starting Point” Tier 1 HTB section. It is considered “Very Easy” and I had second thoughts on whether to even document it but since I learned quite a bit I decided to include it in the learning journey. I had to do quite the research to end up…
-
Shocker – Hack The Box
This was my third vulnerable machine solved on Hack The Box after the “Lame” box. This box was a particularly interesting one in that it stretched my patience a little further than I had expected given that a few other simple but not so obvious Gobuster and Nmap scans were required as they were built…
-
Lame – Hack The Box
This was my second vulnerable box solved after Nibbles through Hack The Box. Lame is a retired machine that suffers from a Samba 3.0.20 RCE which allows an attacker to remotely execute commands at will. I first performed a manual attack of the machine and then transitioned to using the automated Metasploit Module attack. ENUMERATION…
-
Nibbles – Hack The Box
This was my first ever solved HTB Box. I will illustrate the methods used to crack it. As most vulnerability assessments begin, nmap was my go-to Linux tool for enumerating which ports were open to better assess my next step and how I’ll be approaching the target from that point onward. NMAP Here I used…