Member-only story
Hack The Box — Arctic Writeup w/o Metasploit
9 min readOct 13, 2019
This is the sixth blog out of a series of blogs I will be publishing on retired HTB machines in preparation for the OSCP. The full list of OSCP like machines compiled by TJnull can be found here.
Let’s get started!
Reconnaissance
First thing first, we run a quick initial nmap scan to see which ports are open and which services are running on these ports.
nmap -sC -sV -O -oA htb/arctic/nmap/initial 10.10.10.11
- -sC: run default nmap scripts
- -sV: detect service version
- -O: detect OS
- -oA: output all formats and store in file nmap/initial
We get back the following result showing that three port is open:
- Ports 135 & 49154: running Microsoft Windows RPC.
- Port 8500: possibly running Flight Message Transfer Protocol (FMTP).
Before we start investigating these ports, let’s run more comprehensive nmap scans in the background to make sure we cover all bases.