HACK THE BOX (HTB) | Getting Started Module | #walkthrough #htb #hackthebox
STUDY WITH ME: https://hacktheboxltd.sjv.io/GmzLNE 0:00 Basic Tools 0:30 Service Scanning 2:26 Web Enumeration 3:25 Public Exploits 6:38 Privilege Escalation 11:10 Nibbles Box - Enumeration 11:40 Nibbles Box - Initial Foothold Getting Started | Basic Tools | #Walkthrough #HTB + Apply what you learned in this section to grab the banner of the above server and submit it as the answer. Getting Started | Service Scanning | #Walkthrough #HTB + Perform a Nmap scan of the target. What is the version of the service from the Nmap scan running on port 8080? + Perform an Nmap scan of the target and identify the non-default port that the telnet service is running on. + List the SMB shares available on the target host. Connect to the available share as the bob user. Once connected, access the folder called 'flag' and submit the contents of the flag.txt file. Getting Started | Web Enumeration | #Walkthrough #HTB + Try running some of the web enumeration techniques you learned in this section on the server above, and use the info you get to get the flag. Getting Started | Public Exploits | #Walkthrough #HTB + Try to identify the services running on the server above, and then try to search to find public exploits to exploit them. Once you do, try to get the content of the '/flag.txt' file. (note: the web server may take a few seconds to start) Getting Started | Privilege Escalation | #Walkthrough + SSH into the server above with the provided credentials, and use the '-p xxxxxx' to specify the port shown above. Once you login, try to find a way to move to 'user2', to get the flag in '/home/user2/flag.txt'. + Once you gain access to 'user2', try to find a way to escalate your privileges to root, to get the flag in '/root/flag.txt'. Getting Started | Nibbles Enumeration | #Walkthrough #HTB + Run an nmap script scan on the target. What is the Apache version running on the server? (answer format: X.X.XX) + Getting Started | Nibbles Initial Foothold | #Walkthrough #HTB Gain a foothold on the target and submit the user.txt flag
Download
0 formatsNo download links available.