Delivery

hackthebox.com - © HACKTHEBOX

🔗 Delivery

Task 1 - Deploy the machine

🎯 Target IP: 10.10.10.222

Create a directory for machine on the Desktop and a directories containing: nmap, content, exploits, scripts materials.

Task 2 - Reconnaissance

I prefer to start recon by pinging the target, this allows us to check connectivity and get OS info.

Sending these three ICMP packets, we see that the Time To Live (TTL) is ~64 secs. this indicates that the target is a *nix system, while Windows systems usually have a TTL of 128 secs.

2.1 - How many TCP ports are open on the target?

command
result

sudo

run as root

sC

run default scripts

sV

enumerate versions

A

aggressive mode

vvv

verbosity

oN

output to file with nmap formatting

It looks like there are 3 open TCP ports on the machine: 22, 80, 8065.

3

2.2 - What is the FQDN for the Help Desk?

We do a specific scan using -sCV parameter:

Now, we try to find potential hidden directory using gobuster:

and we find an interesting path:

http://delivery.htb/images/

http://delivery.htb/assets/ http://delivery.htb/error/]

Going to http:\\delivery.htb page, and start to check it.

Clicking on "HELPDESK" link, we found this error page:

While, clicking on contact-us and next to MatterMost server link, we found a great resource!

2.3 -

We can try to put a file using ftp, in this case we use nmap result file (port_scan):

yes

2.4 -

2.5 -

We launch msfconsole:

Task 3 -

3.1 -

We've not access to babibs' directory, we can try to find "user.txt" flag using while command in C:\ root.

Starting to root folder (C:\) we can find quickly flags, using where command in recusive mode (/r):

and read user.txt flag using type command (equivalent to cat on *nix):

🚩 Flag 1 (user.txt)

5d3fc209e1fae6d5df926fe7dc8a16bd

Task 4 - Find root flag

After that, we do the same thing for root.txt flag

🚩 Flag 2 (root.txt)

cb43e154f9c2ca60b68c8150e5162f32

Last updated