Fawn Machine Checklist

1️⃣ Lab Setup & Scope

  • HTB OpenVPN Connected
  • Target machine spawned/running
  • Target IP identified: 10.129.85.119
  • PING check successful
  • Legal HTB Lab session verified

2️⃣ Network Discovery

  • Target IP confirmed: 10.129.85.119
  • Local HTB IP identified

3️⃣ Port Scanning

  • All 65535 ports scanned (Nmap initial)
  • Service versions and default scripts detected (Port 21)

4️⃣ Service Enumeration

SSH / FTP / SMB / RPC

  • Anonymous login tested (Found: Anonymous FTP login allowed)
  • SMB shares listed (N/A)
  • Usernames harvested (Anonymous)

5️⃣ Vulnerability Identification

  • Known vulnerabilities researched (Misconfigured Anonymous FTP)
  • Exploit paths identified (Direct file access via FTP)

6️⃣ Initial Access (Foothold)

  • Exploit successfully executed (Logged in as anonymous)
  • Current user context confirmed (FTP guest access)

7️⃣ Post-Exploitation Enumeration

  • Sensitive files searched (Found: flag.txt)

8️⃣ Privilege Escalation

  • PrivEsc vector identified (N/A - flag accessible as guest)
  • Root/Admin access gained (Accessible flag)

9️⃣ Flags / Proof of Compromise

  • Flag found & submitted: 035db21c...
  • Evidence captured (Screenshots organized)

🔟 Cleanup & Documentation

  • Temporary files removed (N/A)
  • Notes completed in Obsidian
  • Commands documented for writeup
  • Screenshots organized in evidence/

🏁 Machine Completion Status

  • Pwned
  • Flags Submitted to HTB

➡️ Machine SOLVED 🏆