Fawn Machine Checklist
1️⃣ Lab Setup & Scope
- HTB OpenVPN Connected
- Target machine spawned/running
- Target IP identified:
10.129.85.119 - PING check successful
- Legal HTB Lab session verified
2️⃣ Network Discovery
- Target IP confirmed:
10.129.85.119 - Local HTB IP identified
3️⃣ Port Scanning
- All 65535 ports scanned (Nmap initial)
- Service versions and default scripts detected (Port 21)
4️⃣ Service Enumeration
SSH / FTP / SMB / RPC
- Anonymous login tested (Found:
Anonymous FTP login allowed) - SMB shares listed (N/A)
- Usernames harvested (Anonymous)
5️⃣ Vulnerability Identification
- Known vulnerabilities researched (Misconfigured Anonymous FTP)
- Exploit paths identified (Direct file access via FTP)
6️⃣ Initial Access (Foothold)
- Exploit successfully executed (Logged in as anonymous)
- Current user context confirmed (FTP guest access)
7️⃣ Post-Exploitation Enumeration
- Sensitive files searched (Found:
flag.txt)
8️⃣ Privilege Escalation
- PrivEsc vector identified (N/A - flag accessible as guest)
- Root/Admin access gained (Accessible flag)
9️⃣ Flags / Proof of Compromise
- Flag found & submitted:
035db21c... - Evidence captured (Screenshots organized)
🔟 Cleanup & Documentation
- Temporary files removed (N/A)
- Notes completed in Obsidian
- Commands documented for writeup
- Screenshots organized in
evidence/
🏁 Machine Completion Status
- Pwned ✅
- Flags Submitted to HTB ✅
➡️ Machine SOLVED 🏆