🔍 Reconnaissance & Connectivity

1. Connectivity

Before starting the machine, ensure the HTB VPN connection is active.


2. Target Identification

Obtained the target IP from the HTB Dashboard.

  • Target IP: 10.129.104.153

  • Ping Test: Checked connectivity to the target.


3. Port Scanning

I used rustscan and nmap to identify open ports and running services.

  • Rustscan: Rapidly identified Ports 21 and 80 as open.
rustscan -a 10.129.104.153

  • Nmap Service Scan:
nmap -sC -sV 10.129.104.153

Results Summary:

PortServiceInfo
21/tcpFTP (vsftpd 3.0.3)Anonymous login allowed; Contains sensitive user lists.
80/tcpHTTP (Apache 2.4.41)Ubuntu-based web server.


4. Initial Findings

The Nmap scan reveals two high-value entry points: an FTP server allowing anonymous login and a web server. The presence of user/password lists on the FTP server suggests a credential-based attack on the web portal.


Next Step