Valentine
Task 1 - Deploy the machine
Task 2 - Reconnaissance
su
echo "10.129.236.216 valentine.htb" >> /etc/hosts
mkdir -p htb/valentine.htb
cd htb/valentine.htb
mkdir {nmap,content,exploits,scripts}
# At the end of the room
# To clean up the last line from the /etc/hosts file
sed -i '$ d' /etc/hostsping -c 3 valentine.htb
PING valentine.htb (10.129.236.216) 56(84) bytes of data.
64 bytes from valentine.htb (10.129.236.216): icmp_seq=1 ttl=63 time=61.0 ms
64 bytes from valentine.htb (10.129.236.216): icmp_seq=2 ttl=63 time=59.5 ms
64 bytes from valentine.htb (10.129.236.216): icmp_seq=3 ttl=63 time=60.0 ms2.1 - How many TCP ports are open on the remote host?
command
result
2.2 - Which flag is used with nmap to execute its vulnerability discovery scripts (with the category "vuln") on the target??
Port 80 and 443


2.3 - What is the 2014 CVE ID for an information disclosure vulnerability that the service on port 443 is vulnerable to?
2.4 - What password can be leaked using (CVE-2014-0160)?



2.5 - What is the relative path of a folder on the website that contains two interesting files, including note.txt?



2.6 - What is the filename of the RSA key found on the website?

Task 3 - Find user flag
3.1 - Submit the flag located in the hype user's home directory.



3.2 - What is the name of the terminal multiplexing software that the hype user has run previously?
3.3 - What is the full path to the socket file used by the tmux session?
3.4 - What user is that tmux session running as?
Task 4 - Find root flag
4.1 - Submit the flag located in root's home directory.
Last updated