Capture the flag (CTF)

Hack the Box (HTB) machines walkthrough series — Nest, part 1

Security Ninja
July 30, 2020 by
Security Ninja

Today, we will be continuing with our exploration of Hack the Box (HTB) machines as seen in previous articles. This walkthrough is of an HTB machine named Nest. This is the first half.

HTB is an excellent platform that hosts machines belonging to multiple OSes. It also has some other challenges as well. Individuals have to solve the puzzle (simple enumeration plus pentest) in order to log into the platform and download the VPN pack to connect to the machines hosted on the HTB platform.

What should you learn next?

What should you learn next?

From SOC Analyst to Secure Coder to Security Manager — our team of experts has 12 free training plans to help you hit your goals. Get your free copy now.

Note: Only write-ups of retired HTB machines are allowed. The machine in this article, named Nest, is retired.

The walkthrough

Let’s start with this machine.

  1. Download the VPN pack for the individual user and use the guidelines to log into the HTB VPN.
  2. The Nest machine IP is 10.10.10.178.
  3. We will adopt our usual methodology of performing penetration testing. Let’s start with enumeration in order to gain as much information about the machine as possible.
  4. As usual, let’s start with the Nmap scan to learn more information about the services running on this machine.
  5. As we can see, multiple ports are listed. As a best practice, I always do a full port scan to see if there are more ports that got discovered. In this case, it was the case, and we found basic ports such as 21 and 80 on full port sweep. [CLICK IMAGES TO ENLARGE]

    <<nmap -sC -sV -oA Nest 10.10.10.178>>


  6. Since we have got a very limited port, let’s start enumeration on port 445 using smbclient. It was found that we can list the shares on the machine.
  7. We can also enter the Data share on the target machine.
  8. As we can see, there are three folders under the Data folder. Let’s start enumeration on that.
  9. We keep digging into all these folders. At last, we saw two interesting files, which were “Welcome Email.txt” and “Maintenance Alerts.txt”.
  10. We’ll download them onto a local machine. Looking into their contents reveals a username and password.
  11. Since we now have a username and password, let’s try the enumeration phase again with these creds.
  12. And we can now enter the IT folder as well. Under the IT folder and RU Scanner folder, we can see a RU_Config.xml file.
  13. Downloading it to the local machine and viewing its contents reveals some interesting facts: port, username and password. This password for user c.smith was a hash and I was not able to break using a normal dictionary-based mechanism.
  14. So, let’s find a way to break this password. Other files found during enumeration listed some files in the IT/carl directory.
  15. Moving to the IT/carl directory, we can see folders named docs, report and VB Projects.
  16. Downloading the VB Project file as the name suggest it relates to RU Scanner file.
What should you learn next?

What should you learn next?

From SOC Analyst to Secure Coder to Security Manager — our team of experts has 12 free training plans to help you hit your goals. Get your free copy now.

The way to achieve the user flag and root flag will be shown in Part 2 of this article series.

Security Ninja
Security Ninja