Post

Conversor

HackTheBox Conversor machine writeup — reconnaissance and enumeration walkthrough.

Conversor

Phase 1: Initial Reconnaissance

Step 1.1: Port Scanning

Open your terminal and execute:

1
sudo nmap -sC -sV <TARGET_IP> -oN nmap_scan.txt

Expected Output:

1
2
3
4
5
6
7
8
9
Starting Nmap 7.95 ( https://nmap.org )
Nmap scan report for <TARGET_IP>
Host is up (0.21s latency).
Not shown: 998 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.9p1 Ubuntu 3ubuntu0.13 (Ubuntu Linux; protocol 2.0)
80/tcp open  http    Apache httpd 2.4.52
|_http-title: Did not follow redirect to http://conversor.htb/
Service Info: Host: conversor.htb; OS: Linux

Step 1.2: Configure DNS Resolution

The scan reveals a hostname conversor.htb. Add it to your hosts file:

1
echo "<TARGET_IP> conversor.htb" | sudo tee -a /etc/hosts

Verify it’s added:

1
tail -n 1 /etc/hosts

Expected Output:

1
<TARGET_IP> conversor.htb

Phase 2: Web Application Discovery

Step 2.1: Access the Web Application

Open your browser and navigate to:

1
http://conversor.htb

What You’ll See: You’ll be redirected to a login page at http://conversor.htb/login


🔒

Premium Content

The full exploitation walkthrough, privilege escalation, and flags are available exclusively for members.

Unlock Full Writeup →
This post is licensed under CC BY 4.0 by the author.