The aim of this walkthrough is to provide help with the Explosion machine on the Hack The Box website. Please note that no flags are directly provided here. Moreover, be aware that this is only one of the many ways to solve the challenges.
It belongs to a series of tutorials that aim to help out complete beginners with finishing the Starting Point TIER 0 challenges.
SETUP
There are a couple of ways to connect to the target machine. The one we will be using throughout this walkthrough is via the provided pwnbox.
Once our connection is taken care of, we spawn the target machine.
Additionally - even though not required - it is possible to set a local variable (only available in the current shell) containing our target host’s IP address. Once set, we can easily access it by prepending a $ to our variable name.
┌─[htb-bluewalle@htb-pwdysfiide]─[~/Desktop]
└──╼ $rhost=<target-hosts-ip>
┌─[htb-bluewalle@htb-pwdysfiide]─[~/Desktop]
└──╼ $ echo $rhost
<target-hosts-ip>
┌─[htb-bluewalle@htb-pwdysfiide]─[~/Desktop]
└──╼ $
You could use the unset command to remove it after you no longer need it.
┌─[✗]─[htb-bluewalle@htb-pwdysfiide]─[~/Desktop]
└──╼ $unset rhost
┌─[htb-bluewalle@htb-pwdysfiide]─[~/Desktop]
└──╼ $
TASK 1
Question: What does the 3-letter acronym RDP stand for?
Look up rdp on the internet.
remote desktop protocol
TASK 2
Question: What is a 3-letter acronym that refers to interaction with the host through a command line interface?
Use the hint feature to get a better understanding of the question.
cli
TASK 3
Question: What about graphical user interface interactions?
The answer should be quite straightforward after the previous task.
gui
TASK 4
Question: What is the name of an old remote access tool that came without encryption by default and listens on TCP port 23?
Use the internet to look up port 23.
telnet
TASK 5
Question: What is the name of the service running on port 3389 TCP?
Run the default nmap scan against the target machine.
┌─[htb-bluewalle@htb-fjpem3fvtz]─[~/Desktop]
└──╼ $nmap $rhost
Starting Nmap 7.93 ( https://nmap.org ) at 2023-05-04 19:20 BST
Nmap scan report for 10.129.1.13
Host is up (0.051s latency).
Not shown: 996 closed tcp ports (conn-refused)
PORT STATE SERVICE
135/tcp open msrpc
139/tcp open netbios-ssn
445/tcp open microsoft-ds
3389/tcp open ms-wbt-server
Nmap done: 1 IP address (1 host up) scanned in 0.70 seconds
┌─[htb-bluewalle@htb-fjpem3fvtz]─[~/Desktop]
└──╼ $
ms-wbt-server
TASK 6
Question: What is the switch used to specify the target hosts IP address when using xfreerdp?
List the xfreerdp command options and their usage with the –help option.
┌─[htb-bluewalle@htb-fjpem3fvtz]─[~/Desktop]
└──╼ $xfreerdp --help
...
/v:<server>[:port] Server hostname
...
/v:
TASK 7
Question: What username successfully returns a desktop projection to us with a blank password?
Well, similarly to the default credentials on linux (like root:root | root:password | user:password | kali:kali ….) there are some for windows too.
Here are some notable examples: Username:Password | Administrator:Administrator …. Since the flag in the last task requires root privileges, we only have administrator as the windows equivalent. Simply press enter when prompted for a password.
┌─[htb-bluewalle@htb-fjpem3fvtz]─[~/Desktop]
└──╼ $xfreerdp /u:Administrator /v:$rhost
...
Administrator
SUBMIT FLAG
Question: Submit root flag
Once logged in on the remote windows machine, you will find the file containing the flag on your Desktop.
flag
Make sure to terminate the target box before you continue with the next machine!