CEH Lab Archtype

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

Week 3 HTB Report Archtype

Report by Rowen
Table of Contents
Pen Test: archtype
Intro and Objective
Introduction
Objective
Report – high level summary
High level summary
Recommendations
Report – Methodologies
Introduction and Objective
Introduction
This document provides comprehensive and detailed documentation
outlining the steps taken to penetrate the security and resilience of the target known
as "archtype." Throughout this guide, we will cover various measures and best
practices aimed at fortifying the machine against potential vulnerabilities and
security threats.

Objective
The objective of the penetration test is to discover and exploit vulnerabilities
in the machine with the main target being to gain access to machine and gain
administrator privileges. However, this is not for malicious purpose as the scope of
this test is to demonstrate the process used in a concise manner while also
explaining any steps or best practices to be taken to patch or monitor the associated
vulnerabilities to secure the target machine.
Report: High level summery

Summery
I was tasked with performing the Pen test against the target on the HTB
network. The test serves as a simulated attack against this specific machine.
Initially I scanned the machine to see what ports were open and what was running.
We can then use smbclient to gain access to the nackups stored on the machine.
With the password for the account found next was to download msspl client remote
tool and remote login. Then with a few commands we create a new stable xp cmd
shell and connect to the server. This grants us root access to the rest of the
machine.

Recommendations
Changing the login so smbclient requires verification might prevent this
from happening again. Should change password for machine. The services are
inherently flawed so changing what is running for this machine is super important.
Main recommendation is to decommission the machine and procure a new one
with better services that cant be manipulated as easy.
Report – Methodologies
First we scan the target
https://systemweakness.com/archetype-hackthebox-walkthrough-be99a1fba8ea

You might also like