Hack the Box (HTB) Machines Walkthrough Series — SolidState

Continuing with our series on Hack The Box (HTB) machines, this article contains the walkthrough of an HTB machine named SolidState.

HTB is an excellent platform that hosts machines belonging to multiple OSes. It also has some other challenges as well. Individuals have to solve the puzzle (simple enumeration plus pentest) in order to log into the platform and download the VPN pack to connect to the machines hosted on the HTB platform.

Note: Writeups of only retired HTB machines are allowed. The machine in this article, named SolidState, is retired.

The Walkthrough

Let’s start with this machine. [CLICK IMAGES TO ENLARGE]

1. Download the VPN pack for the individual user and use the guidelines to log into the HTB VPN.

2. The SolidState machine IP is

3. We will adopt the same methodology of performing penetration testing as we have previously used. Let’s start with enumeration in order to gain as much information about the machine as possible.

4. As usual, let’s start with the nmap scan to gather more information about the services running on this machine.
<<nmap -sC -sV -oA solidstate>>

5. As we can see, there is the presence of a James smtpd server. There are some known exploits for this; let’s look at this one.

6. If we read the exploit, we can see that it is trying to connect to port 4555 with the default credentials root/root.

7. Let’s see if we have port 4555 open on the machine or not.
<<nmap -sC -sV -p4555>>

8. Great, so the port is opened and James smtpd is running. Let’s try to Telnet to this server.
<<telnet 4555>>

9. Run HELP to see the available commands.
<< HELP >>

10. (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Security Ninja. Read the original post at: