HTB: Explosion Walkthrough

Prepared By Araiz Naqvi.
Overview
- Difficulty: Easy
- Operating System: Linux
- Objective: Capture flag via RDP
- Tools Used: nmap, xfreerdp, openvpn
Nmap Scans
Let’s start with stealth scanning default ports using the -sS flag:

Clearly, ports 135, 139, 445 and 3389 are open and resemble SMB and RDP.
But since RDP is open, we might just be able to directly access the remote machine locally.
Let’s run a service and default script scan on these ports:

As can be seen very clearly port 3389 is responding with an active RDP along with we get to see that the remote machine is running Windows.
Using xfreerdp
Let’s use xfreerdp with the IP assigned:

As seen from here, there are two things that come up, which is that there’s some certificate related issue and requires login creds.
Let’s fix the first by using /cert-ignore:

Problem 1 solved. Now, after figuring out usernames like root, Root, Admin, admin I tried using Administrator which tends to not require a password.


That’s your flag!
Comments
Post a Comment