Meow Machine Checklist

1️⃣ Lab Setup & Scope

  • HTB OpenVPN Connected
  • Target machine spawned/running
  • Target IP identified: 10.129.84.227
  • PING check successful
  • Legal HTB Lab session verified

2️⃣ Network Discovery

  • Target IP confirmed: 10.129.84.227
  • Local HTB IP identified

3️⃣ Port Scanning

  • All 65535 ports scanned (Found Port 23 via Nmap)
  • Service versions and default scripts detected

4️⃣ Service Enumeration

Telnet (Port 23)

  • Service version identified
  • Tested for unauthenticated/default login

5️⃣ Vulnerability Identification

  • Path identified (Unauthenticated root access via Telnet)

6️⃣ Initial Access (Foothold)

  • Logged in as root with no password
  • Verified full system control

7️⃣ Post-Exploitation Enumeration

  • Flag file located in home directory

8️⃣ Privilege Escalation

  • Not Required (Direct access to root)

9️⃣ Flags / Proof of Compromise

  • Flag found & submitted: b40abdfe...
  • Evidence captured (Screenshots organized)

🔟 Cleanup & Documentation

  • Notes completed in Obsidian
  • Screenshots organized in evidence/

🏁 Machine Completion Status

  • Pwned
  • Flags Submitted to HTB

➡️ Machine SOLVED 🏆