Hack the Box (HTB) Machines Walkthrough Series — Lazy

So far, we have seen numerous Vulnhub machine walkthroughs which illustrate how to enumerate a machine and other possible entry points. We will continue the same process of performing penetration testing in machines hosted on another popular platform known as Hack The Box (HTB).

HTB is an excellent platform that hosts machines belonging to multiple OSes. It also has some other challenges as well. An individual has to solve the puzzle (simple enumeration and pentest) in order to log into the platform and can download the VPN pack to connect to the machines hosted on the HTB platform.

Note: Only writeups of retired HTB machines are allowed. The machine in this article, called “Lazy,” is retired.

Ethical Hacking Boot Camp — 93% Exam Pass Rate

Let’s start with this machine.

  1. Download the VPN pack for the individual user and use the guidelines to log into the HTB VPN.
  2. The “Lazy” machine IP is
  3. We will adopt the same methodology as we do in performing penetration testing. Let’s start with enumeration in order to gain as much information about the machine as possible.
  4. Below is the output of the nmap scan. As we can see, ports 22 and 80 are opened.
    <<nmap -sC -sV >>

  5. Let’s gather more information around these ports. Below is the landing page of port 80. I checked into the source and nothing important came up.
  6. I register the new user with username lhm and a dummy password.
  7. After this attempt to login, intercept the request with Burp Suite to see the parameters.
  8. Here we can see that there are two cookies with setup. One is PHPSessID and the other is the Auth cookie. We can definitely play with the Auth cookie to see what the value is behind (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Security Ninja. Read the original post at: