📃Template

Enter vulnerable machine details here

Preparation

As always I am going to prepare my workspace for the following assessment by exporting environment variables, creating new directories and changing my present working directory to the correct one.

export TARGET_NAME=
export TARGET=
mkdir -p ~/machines/htb/${TARGET_NAME}/nmap
cd ~/machines/htb/${TARGET_NAME}
mkdir exfil

Enumeration

Key Info:

  • Users:

  • OS:

  • Open ports:

Nmap

Port Scan

Vulnerability Scan

Service Enumeration


Exploitation


Exfiltration - user


Escalation


Exfiltration - root


Culmination

What did I learn? What did I find interesting or surprise me? What would I do differently if I were to tackle this box again?

Last updated