HackTheBox: Writeup

this post describes the process of finding the user and root flags in HackTheBox Writeup machine. So as always  start with an Nmap scan to discover which services are running. # Nmap 7.70 scan initiated Tue Jun 25 12:42:32 2019 as: nmap -p- -O -sV -oN scan.txt 10.10.10.138 Nmap scan report for ip-10-10-10-138.eu-west-2.compute.internal (10.10.10.138) Host…

HackTheBox: Bastion

The first step is to Nmap the machine to find which services are running: root@kali://root/Documents/bastion# cat scan # Nmap 7.70 scan initiated Wed Aug 7 10:36:31 2019 as: nmap -A -oN scan -p- 10.10.10.134 Nmap scan report for 10.10.10.134 Host is up (0.032s latency). Not shown: 65522 closed ports PORT STATE SERVICE VERSION 22/tcp open…

HackTheBox: Netmon

This is the second machine i have completed on HackTheBox. I started with the Access machine. The write-up for that can be found HERE. So the first step to the perform an Nmap scan to see what kind of services the machine is running: What sticks out the most in the results of this scan…

HackTheBox: Access

I should preface this by saying that this machine took me about 6 hours to complete overall. I went down a couple of rabbit holes i didn’t need to go down and the final solution was much simpler than i thought. My first step. Which is almost always the case when starting out on a…