Overview
The HackTheBox Starting Point track is designed for absolute beginners. These three machines — Meow, Fawn, and Dancing — teach fundamental enumeration and service exploitation techniques that form the backbone of penetration testing.
Meow — Telnet
Recon
|
|
Found port 23 (Telnet) open. Telnet is an unencrypted remote login protocol.
Exploitation
Connected via Telnet and tried common default credentials:
|
|
Logged in as root with an empty password — a classic misconfiguration.
Flag:
b40abdfe23665f766f9c61ecba8a4c19
Takeaway
Telnet transmits everything in cleartext, including credentials. It should never be used in production — SSH is the secure alternative.
Fawn — FTP
Recon
|
|
Found port 21 (FTP) open with anonymous login enabled.
Exploitation
|
|
Flag:
035db21c881520061c53e0536e44f815
Takeaway
Anonymous FTP access is a common misconfiguration. Always disable anonymous access and enforce strong authentication on FTP servers.
Dancing — SMB
Recon
|
|
Found port 445 (SMB) open. Listed available shares:
|
|
Shares found: ADMIN$, C$, IPC$, and WorkShares (accessible without authentication).
Exploitation
|
|
Flag:
5f61c10dffbc77a704d76016a22f1664
Takeaway
SMB shares should require authentication. Never expose shares with sensitive data to unauthenticated users. Use access control lists and network segmentation to limit exposure.
Flags
- Meow:
b40abdfe23665f766f9c61ecba8a4c19 - Fawn:
035db21c881520061c53e0536e44f815 - Dancing:
5f61c10dffbc77a704d76016a22f1664