Skip to content

NullVectorSec/htb-labs-starting-point

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 

Repository files navigation

htb-labs-starting-point

Overview

This repo contains walkthroughs for the Hack the Box Starting Point machines. They are more focused on the steps taken and the outputs observed, opting for providing links to external resources for details on vulnerabilies, exploits, and tools used.

The aim is to provide the reader with a more concise resource when working through the challenges, while still providing opportunities gain additional information with external links, should it be required.

Machines

Tier 0

Machine Name Services Vulnerabilities/Exploits Tools
Meow telnet default credentials / lacks authentication nmap, telnet
Fawn ftp anonymous authentication nmap, ftp
Dancing smb anonymous authentication nmap, smbclient
Redeemer redis unauthenticated access nmap, redis-cli
Explosion smb, rdp default credentials / lacks authentication nmap, smbclient, xfreerdp
Preignition http default credentials / weak authentication nmap, curl, gobuster
Mongod mongodb unauthenticated access nmap, ssh, mongosh, mongodb
Synced rsync unauthenticated access nmap, rsync

Tier 1

Machine Name Services Vulnerabilities/Exploits Tools
Appointment http sql injection nmap, curl
Sequel mysql default credentials / lacks authentication nmap, mysql
Crocodile ftp, http anonymous authentication / exposed credentials nmap, ftp
Responder http, WinRM parameter tampering, LFD, LFI, RFI nmap, responder, john the ripper, evil-winrm
Three http, aws S3 unrestricted file upload, RCE nmap, gobuster, awscli, netcat
Ignition http common credentials / weak authentication nmap, curl, gobuster
Bike http SSTI, RCE nmap, curl
Funnel ftp ssh exposed credentials / default credentials / ssh pivoting nmap, ftp, ssh, psql
Pennyworth http, jenkins default credentials / weak authentication / RCE nmap, jenkins
Tactics smb default credentials / lacks authentication nmap, smbclient, psexec.py

Tier 2

  • In progress

Important: General Disclaimer

  • These walkthroughs are for educational purposes only.
  • The techniques and tools shown are intended for use in lab environments or on systems where you have explicit permission.
  • Under no circumstances should this content be used to compromise, attack, or gain unauthorised access to systems, networks, or data.
  • All content represents the personal views and findings of the author and does not represent the views, policies, or positions of any employer, organisation, or platform used while creating the material.
  • The author makes no warranties about the accuracy or fitness of the content
  • The author accepts no liablity for any misuse or damage resulting from the use of the material.

Important: External Links / Third-Party Content Disclaimer

  • Any links provided are for reference only and the author does not control, endorse, or guarantee the accuracy, completeness, or safety of thrid-party content.
  • External sites may change or remove content without notice and may contain content that is inappropriate, offensive, or harmful.
  • Use caution when following external links: verify the source, check the content before running code, and do not download or execute files from untrusted sites.
  • Use any and all external links solely at your own discretion and risk.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •