🌟
Noel's Cyberkshetra Blogspace
LinkedIn ProfileGithub ProfilePersonal Blogspot
  • Welcome to my Gitbooks Page
  • 💽Let's Defend Blue Team Walkthroughs
    • SOC164 - Suspicious Mshta Behavior Alert
    • SOC147 - SSH Scan Activity Alert
    • SOC146  -  Phishing Mail Detected Alert
    • SOC145 - Ransomware Detected Alert
    • SOC144  -  New scheduled task created Alert
    • SOC143 - Password Stealer Detected Alert
    • SOC141  -  Phishing URL Detected Alert
    • SOC141 - Phishing URL Detected Alert
    • SOC137 — Malicious File/Script Download Attempt: A Walkthrough
    • SOC109  -  Emotet Malware Detected Alert
    • SOC104 - Malware Detected Alert
    • SOC101  -  Phishing Mail Detected Alert
    • HTTP Basic Auth: Let's Defend DFIR Challenge
    • ShellShock Attack: Let’s Defend Challenge
    • 2021’s 0-Day MSHTML: Let's Defend Lab
  • 🤺BTLO Walkthroughs
    • BTLO: Network Analysis-Web Shell Challenge
    • BTLO: Suspicious USB Stick Challenge
  • 💒WiCYS CyberStart
    • Chapter 1 - Amsterdam A Running Start
      • WiCYS CyberStart (Amsterdam) Challenge 1
      • WiCYS CyberStart (Amsterdam) Challenge 2
      • WiCYS CyberStart (Amsterdam) Challenge 3
      • WiCYS CyberStart (Amsterdam) Challenge 4
    • Chapter 2 - Tokyo Patterns of Behaviour
      • WiCYS CyberStart (Tokyo) Challenge 1
      • WiCYS CyberStart (Tokyo) Challenge 2
      • WiCYS CyberStart (Tokyo) Challenge 3
      • WiCYS CyberStart (Tokyo) Challenge 4
    • Chapter 3 - Barcelona In the thick of it
      • WiCYS CyberStart (Barcelona) Challenge 1
      • WiCYS CyberStart (Barcelona) Challenge 2
      • WiCYS Cyberstart (Barcelona) Challenge 3
      • WiCYS CyberStart (Barcelona) Challenge 4
  • 📕Technical Cyber articles
    • An in-depth analysis of an Intrusion Prevention System
    • DevSecOps-Making a difference from traditional DevOps
    • CVE - 2020–1472 (Zerologon Vulnerability)-Exploitation & Remediation
    • Computer Forensics Acquisition
    • Cyber Hygiene Tips
    • Hack your System - Linux Edition
    • Markovian Parallax Denigrate-Breaking the cipher
    • SIEM-Incorporating Incident Response into Network Security
    • Social Engineering-A leading cause for vulnerability occurrence
    • Report Writing in Digital & Multimedia Forensics
    • Zero-Day Vulnerabilities: A short overview
    • Zero Trust Network Access-A solution to Network Security
  • 🧑‍💻Hack The Box : Starting Point Machines
    • Meow
    • Fawn
    • Dancing
    • Redeemer
Powered by GitBook
On this page
  1. Hack The Box : Starting Point Machines

Meow

OS Type : Unix

PreviousHack The Box : Starting Point MachinesNextFawn

Last updated 1 year ago

Let's start with the proceedings by spawning the machine and connecting to OpenVPN with the configuration file provided by HackTheBox, from the terminal of the hacking machine

Command - openvpn <name of your configuration file>

Please ensure that the connection is established with the message 'Initialization Sequence Completed' on the CLI

We are met with the IP of the 'Meow' machine, which indicates that the machine is up and running. Our connection is also setup

Let's now dive into the questions.

Please Note: The questions posed are a mixed bunch. Some of the questions are generic in nature and some will be surrounding the machine that we are about to solve.

Q1) What does the acronym VM stand for?

A1) Virtual Machine

Q2) What tool do we use to interact with the operating system in order to issue commands via the command line, such as the one to start our VPN connection? It’s also known as a console or shell.

A2) Terminal

This should be evident, as we just used the Terminal to connect to HTB, via Openvpn. The Terminal uses a Command Line Interface (CLI) for the user and machine to interact, using text

Q3)What service do we use to form our VPN connection into HTB labs?

A3) Openvpn

Q4) What is the abbreviated name for a ‘tunnel interface’ in the output of your VPN boot-up sequence output?

A4) tun

Q5) What tool do we use to test our connection to the target with an ICMP echo request?

A5) ping

A ping command, issued from the terminal uses ICMP (type of protocol) to check the availaibility of a host that is connected to the same network as you.

Q6) What is the name of the most common tool for finding open ports on a target?

A6) nmap

Network Mapper or Nmap for short

Q7) What service do we identify on port 23/tcp during our scans?

A7) 23

Going by common port service convention, Telnet serves on port 23

Q8) What username is able to log into the target over telnet with a blank password?

NSE Scripts can sometimes help in enumerating users present on services being provided by the machine. This applies to services such as FTP. However in the case of Telnet, it won't be useful

It is a possibility that root / admin users can have an existing account on Telnet

A8) Telnet

Q9) Submit root flag

a)Let's log on to the Telnet instance on the Meow machine, using the following command - telnet <Machine IP> [In some cases, telnet needs to be installed using apt]

b) Login as root and press enter [ a password would not be required]

c) Running 'ls' command to list the files present, we find our flag file!

A9) <Your Flag>

Submit the flag and we are good to proceed to Fawn!

🧑‍💻
Page cover image