Introduction
Meow is the first machine in HackTheBox’s Starting Point series. This beginner-friendly CTF teaches basic enumeration techniques and demonstrates how simple misconfigurations can lead to system compromise.
Target: 10.10.10.10
Objective: Find the flag in the /root directory
Initial Enumeration
Port Scanning with Nmap
We’ll start with a comprehensive port scan to identify open services:
nmap -sC -sV -oA initial_scan 10.10.10.10
Results:
PORT STATE SERVICE VERSION
23/tcp open telnet Linux telnetd
Connecting to Telnet
Since Telnet is open and doesn’t require authentication by default (in this case), let’s connect:
telnet 10.10.10.10
Gaining Access
Upon connecting, we might be dropped into a shell directly. Let’s check what user we’re running as:
whoami
# Result: root
Great! We have root access without any authentication. This demonstrates the dangers of leaving services unsecured.
Finding the Flag
Navigate to the root directory and locate the flag:
ls -la /root
cat /root/flag.txt
Flag: HTB{xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx}
Summary and Key Takeaways
What We Learned:
- Basic Enumeration: Using nmap to discover open ports
- Service Identification: Recognizing Telnet as a potential entry point
- Direct Access: Exploiting misconfigured services
- Privilege Escalation: Already at root (no escalation needed)
Security Lessons:
- Never leave services like Telnet exposed without authentication
- Always use encrypted protocols (SSH instead of Telnet)
- Implement proper access controls on all network services
Commands Used:
nmap: Network scannertelnet: Insecure remote shell protocolwhoami: Check current userlsandcat: File navigation and reading
Additional Resources
Related Posts
Happy hacking! Stay ethical and always get proper authorization before testing.