Tier 0: HackTheBox Starting Point - 5 Machines - Full Walkthrough (for beginners)

4 min read 1 year ago
Published on Aug 03, 2024 This response is partially generated with the help of AI. It may contain inaccuracies.

Table of Contents

Introduction

This tutorial provides a comprehensive step-by-step guide to navigating Hack The Box's Starting Point, specifically focusing on the Tier 0 machines. It is designed for beginners in hacking and information security, offering insights into connecting to the VPN, enumerating machines, and exploiting vulnerabilities to capture flags. By following this guide, you'll gain hands-on experience with essential tools and techniques in the field of penetration testing.

Chapter 1: Connect to VPN

To access Hack The Box (HTB) labs, you must first connect to the VPN. Here's how to do that:

  1. Download the VPN Configuration File

    • Log in to your Hack The Box account.
    • Download the VPN configuration file for the Starting Point.
  2. Connect Using OpenVPN

    • Open a terminal on your machine.
    • Use the following command to connect:
      sudo openvpn /path/to/your/config.ovpn
      
    • Replace /path/to/your/config.ovpn with the actual path to your downloaded configuration file.
  3. Verify Connection

    • After connecting, check your IP address with:
      ifconfig
      
    • Look for the tun0 adapter to confirm you have an IP address assigned (e.g., 10.10.14.x).
  4. Troubleshooting

    • If you encounter issues connecting, ensure you have the correct VPN configuration for the Starting Point tier, as different tiers may require different VPN settings.

Chapter 2: Meow Machine Walkthrough

Once connected to the VPN, you can start working on the first machine, "Meow." Follow these steps:

  1. Spawn the Machine

    • Log into the HTB portal and spawn the "Meow" machine.
  2. Identify the Machine's IP Address

    • After spawning, note the assigned IP address for the machine.
  3. Enumerate Services with Nmap

    • Run an Nmap scan to identify open ports and services:
      nmap -sC -sV -p- 10.10.14.x
      
    • Replace 10.10.14.x with the actual IP of the machine.
  4. Connect via Telnet

    • If port 23 (Telnet) is open, connect using:
      telnet 10.10.14.x
      
    • Attempt to log in with potential usernames like "test" or "root."
  5. Capture Flags

    • After logging in, you can find the user flag (user.txt) and root flag (root.txt) in the appropriate directories. Use the following commands to read them:
      cat user.txt
      cat root.txt
      

Chapter 3: Fawn Machine Walkthrough

After completing "Meow," proceed to the "Fawn" machine.

  1. Spawn the Machine

    • Spawn the "Fawn" machine from the HTB portal.
  2. Nmap Scan for Enumeration

    • Perform another Nmap scan as previously described to find open ports.
  3. Connect via FTP

    • If FTP (port 21) is open, try connecting:
      ftp 10.10.14.x
      
    • Attempt to log in as "anonymous" with no password.
  4. Download the Flag

    • Look for the flag file:
      get flag.txt
      

Chapter 4: Dancing Machine Walkthrough

Next, tackle the "Dancing" machine.

  1. Spawn the Machine

    • Spawn the "Dancing" machine.
  2. Run Nmap for Enumeration

    • Execute an Nmap scan to discover services.
  3. Access SMB Shares

    • Connect to SMB shares:
      smbclient -L //10.10.14.x -U guest
      
    • List available shares and navigate to them to find the flag.
  4. Capture the Flag

    • Use the get command to download the flag:
      get flag.txt
      

Chapter 5: Explosion Machine Walkthrough

Proceed to the "Explosion" machine.

  1. Spawn the Machine

    • Spawn the "Explosion" machine.
  2. Nmap Scan for Services

    • Start with an Nmap scan for open ports.
  3. Identify SMB

    • Access SMB services and identify shares as done previously.
  4. Download the Flag

    • Use SMB commands to locate and download the flag.

Chapter 6: Preignition Machine Walkthrough

Finally, work on the "Preignition" machine.

  1. Spawn the Machine

    • Spawn the "Preignition" machine.
  2. Nmap Scan for Services

    • Conduct an Nmap scan to find services.
  3. Remote Desktop Protocol (RDP) Connection

    • Use RDP to connect:
      xfreerdp /v:10.10.14.x
      
    • Enter credentials as needed to access the machine.
  4. Capture the Root Flag

    • Locate and download the root flag as done previously.

Conclusion

Congratulations on completing the walkthrough for the Tier 0 machines on Hack The Box Starting Point! You have learned how to connect to a VPN, enumerate services, exploit vulnerabilities, and capture flags across multiple machines. For your next steps, consider exploring Tier 1 machines for more advanced challenges or diving deeper into penetration testing techniques. Keep practicing, and enjoy your journey in the field of information security!