HTB: Getting Started — First Machine Walkthrough

January 15, 2025 · HackTheBox · Easy

LinuxWebPrivilege Escalation

This is a placeholder writeup. Replace this with your actual CTF writeup content.

Start by describing your initial reconnaissance and enumeration process. What ports did you find? What services were running? What did nmap, gobuster, or other tools reveal?

Then walk through the vulnerability you identified and how you exploited it to gain initial access. Include the key commands you ran.

Finally, describe the privilege escalation path to root and what you learned from the machine.