HTB

ForwardSlash Write-up

This box was really important for me since it was my first active red box (congratulations to me). I learned a lot things and most above all perseverance. By doing it I fully grasped the philosophy behind Try harder!

Tabby Write-Up [Active]

The password to unlock the content is the MD5 hash of the first line of the /etc/shadow file: 0c*****************************5.

Resolute Write-Up

User Flag Result of nmap scan: PORT STATE SERVICE VERSION 88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2020-03-14 20:28:46Z) 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: megabank.

Cache Write-Up [Active]

The password to unlock the content is the MD5 hash of the first line of the /etc/shadow file: 54*****************************7.

Admirer Write-Up [Active]

The password to unlock the content is the MD5 hash of the first line of the /etc/shadow file: 06*****************************0.

Obscurity Write-up

Foothold Nmap scan provides: PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 2048 33:d3:9a:0d:97:2c:54:20:e1:b0:17:34:f4:ca:70:1b (RSA) | 256 f6:8b:d5:73:97:be:52:cb:12:ea:8b:02:7c:34:a3:d7 (ECDSA) |_ 256 e8:df:55:78:76:85:4b:7b:dc:70:6a:fc:40:cc:ac:9b (ED25519) 80/tcp closed http 8080/tcp open http-proxy BadHTTPServer | fingerprint-strings: | GetRequest, HTTPOptions: | HTTP/1.

Mango Write-up

User Flag The usual nmap scan provides following results: PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 2048 a8:8f:d9:6f:a6:e4:ee:56:e3:ef:54:54:6d:56:0c:f5 (RSA) | 256 6a:1c:ba:89:1e:b0:57:2f:fe:63:e1:61:72:89:b4:cf (ECDSA) |_ 256 90:70:fb:6f:38:ae:dc:3b:0b:31:68:64:b0:4e:7d:c9 (ED25519) 80/tcp open http Apache httpd 2.

HackTheBox CTF Setup

What’s HackTheBox ? HTB is an online platform allowing you to test and advance your skills in cyber security. It offers many challenges around cyber security like CTF, cryptography, steganography, etc.