Redeemer Machine Checklist

1️⃣ Lab Setup & Scope

  • HTB OpenVPN Connected
  • Target machine spawned/running
  • Target IP identified: 10.129.80.36
  • PING check successful
  • Legal HTB Lab session verified

2️⃣ Network Discovery

  • Target IP confirmed: 10.129.80.36
  • Local HTB IP identified

3️⃣ Port Scanning

  • All 65535 ports scanned (Found Port 6379 via Rustscan)
  • Service versions and default scripts detected

4️⃣ Service Enumeration

Database (Redis)

  • Unauthenticated connection tested (Login successful)
  • Server info gathered (info)
  • Keyspaces listed (keys *)

5️⃣ Vulnerability Identification

  • Path identified (Exposed Redis instance without password)

6️⃣ Initial Access (Foothold)

  • Database accessed via redis-cli
  • Verified control over the instance

7️⃣ Post-Exploitation Enumeration

  • Sensitive data searched (Found: flag key)

8️⃣ Privilege Escalation

  • Not Required (Data accessible directly)

9️⃣ Flags / Proof of Compromise

  • Flag found & submitted: 03e1d2b3...
  • Evidence captured (Screenshots organized)

🔟 Cleanup & Documentation

  • Notes completed in Obsidian
  • Screenshots organized in evidence/

🏁 Machine Completion Status

  • Pwned
  • Flags Submitted to HTB

➡️ Machine SOLVED 🏆