Meow – HacktheBox Link to heading
- System: Linux
- Difficulty: Very Easy
- Plataform: HacktheBox
Summary Link to heading
“Meow” is a “Very Easy” difficulty machine from the HackTheBox
platform. Meow is part of the Starting Point
laboratories.
To complete the machine run nmap to perform a port scan to the IP address 10.129.202.44
specifically port 23/tcp, since I knew that the port is open with the telnet service using the command Telnet [IPAddress]
me connect to the meow
server and providing root
as the domain name I manage to enter the server, using ls
I list the contents of the server and find a file flag.txt
with the command cat
I see the contents of the file and This is how I find the flag
solving this machine.
Procedure Link to heading
To attack the meow machine you need to be on the same network, connect to the Starting Point
VPN using one of the following options:
I have used OVPN
method and Kali Linux as main system for this project, Download the file (.ovpn):
Open a terminal and run the following command:
sudo openvpn starting_point_R4NC0X.ovpn
The name
starting_point_R4NC0X.ovpn
should be replaced with the name of the file you downloaded to your machine
Refresh the page in the browser to check the new connection and activate the machine by clicking on Spawn Machine
The machine is already active and now shows the IP address
Now I solve all the tasks of the machine, some of the tasks are clues to solve this machine.
- Task 1 What does the acronym VM mean?
Virtual Machine
- Task 2 What tools do we use to interact with the operating system to be able to issue commands through the command line, such as starting our VPN connection? It is also known as a console or shell
Terminal
- Task 3 What service do we use to form our VPN connection in the HTB laboratories?
openvpn
- Task 4 What tool do we use to test our connection to the target with an ICPM echo request?
Ping
- Task 5 What is the name of the most common tool to find open ports on a target
nmap
- Task 6 What service do we identify on port 23/tcp during our scans?
Telnet
- Task 7 What username can log into the target via telnet with a blank password?
Root
- Send Root Flag
In order to find the flag, scan the machine’s IP using the
Nmap
tool.
Note that the Telnet service is open on port 23, so I write the command Telnet
with the IP address.
Using the default username in the Meow login
we can access the Meow
machine
Using the ls
command we will list all the elements contained in the root@meow
directory
root@meow:ls
flag.txt snap
root@meow:cat flag.txt
b40abdfe23665f766f9c61ecba8a4c19
The flag was already found, I copied it and pasted it into Send Flag
.
Once I sent the flag, a message appeared that said Meow has been Pwned