Tier 0: HackTheBox Starting Point - 5 Machines - Full Walkthrough (for beginners)
Table of Contents
Introduction
This tutorial provides a comprehensive step-by-step guide to navigating Hack The Box's Starting Point, specifically focusing on the Tier 0 machines. It is designed for beginners in hacking and information security, offering insights into connecting to the VPN, enumerating machines, and exploiting vulnerabilities to capture flags. By following this guide, you'll gain hands-on experience with essential tools and techniques in the field of penetration testing.
Chapter 1: Connect to VPN
To access Hack The Box (HTB) labs, you must first connect to the VPN. Here's how to do that:
-
Download the VPN Configuration File
- Log in to your Hack The Box account.
- Download the VPN configuration file for the Starting Point.
-
Connect Using OpenVPN
- Open a terminal on your machine.
- Use the following command to connect:
sudo openvpn /path/to/your/config.ovpn
- Replace
/path/to/your/config.ovpn
with the actual path to your downloaded configuration file.
-
Verify Connection
- After connecting, check your IP address with:
ifconfig
- Look for the
tun0
adapter to confirm you have an IP address assigned (e.g., 10.10.14.x).
- After connecting, check your IP address with:
-
Troubleshooting
- If you encounter issues connecting, ensure you have the correct VPN configuration for the Starting Point tier, as different tiers may require different VPN settings.
Chapter 2: Meow Machine Walkthrough
Once connected to the VPN, you can start working on the first machine, "Meow." Follow these steps:
-
Spawn the Machine
- Log into the HTB portal and spawn the "Meow" machine.
-
Identify the Machine's IP Address
- After spawning, note the assigned IP address for the machine.
-
Enumerate Services with Nmap
- Run an Nmap scan to identify open ports and services:
nmap -sC -sV -p- 10.10.14.x
- Replace
10.10.14.x
with the actual IP of the machine.
- Run an Nmap scan to identify open ports and services:
-
Connect via Telnet
- If port 23 (Telnet) is open, connect using:
telnet 10.10.14.x
- Attempt to log in with potential usernames like "test" or "root."
- If port 23 (Telnet) is open, connect using:
-
Capture Flags
- After logging in, you can find the user flag (user.txt) and root flag (root.txt) in the appropriate directories. Use the following commands to read them:
cat user.txt cat root.txt
- After logging in, you can find the user flag (user.txt) and root flag (root.txt) in the appropriate directories. Use the following commands to read them:
Chapter 3: Fawn Machine Walkthrough
After completing "Meow," proceed to the "Fawn" machine.
-
Spawn the Machine
- Spawn the "Fawn" machine from the HTB portal.
-
Nmap Scan for Enumeration
- Perform another Nmap scan as previously described to find open ports.
-
Connect via FTP
- If FTP (port 21) is open, try connecting:
ftp 10.10.14.x
- Attempt to log in as "anonymous" with no password.
- If FTP (port 21) is open, try connecting:
-
Download the Flag
- Look for the flag file:
get flag.txt
- Look for the flag file:
Chapter 4: Dancing Machine Walkthrough
Next, tackle the "Dancing" machine.
-
Spawn the Machine
- Spawn the "Dancing" machine.
-
Run Nmap for Enumeration
- Execute an Nmap scan to discover services.
-
Access SMB Shares
- Connect to SMB shares:
smbclient -L //10.10.14.x -U guest
- List available shares and navigate to them to find the flag.
- Connect to SMB shares:
-
Capture the Flag
- Use the
get
command to download the flag:get flag.txt
- Use the
Chapter 5: Explosion Machine Walkthrough
Proceed to the "Explosion" machine.
-
Spawn the Machine
- Spawn the "Explosion" machine.
-
Nmap Scan for Services
- Start with an Nmap scan for open ports.
-
Identify SMB
- Access SMB services and identify shares as done previously.
-
Download the Flag
- Use SMB commands to locate and download the flag.
Chapter 6: Preignition Machine Walkthrough
Finally, work on the "Preignition" machine.
-
Spawn the Machine
- Spawn the "Preignition" machine.
-
Nmap Scan for Services
- Conduct an Nmap scan to find services.
-
Remote Desktop Protocol (RDP) Connection
- Use RDP to connect:
xfreerdp /v:10.10.14.x
- Enter credentials as needed to access the machine.
- Use RDP to connect:
-
Capture the Root Flag
- Locate and download the root flag as done previously.
Conclusion
Congratulations on completing the walkthrough for the Tier 0 machines on Hack The Box Starting Point! You have learned how to connect to a VPN, enumerate services, exploit vulnerabilities, and capture flags across multiple machines. For your next steps, consider exploring Tier 1 machines for more advanced challenges or diving deeper into penetration testing techniques. Keep practicing, and enjoy your journey in the field of information security!