Conversor
HackTheBox Conversor machine writeup — reconnaissance and enumeration walkthrough.
Conversor
Phase 1: Initial Reconnaissance
Step 1.1: Port Scanning
Open your terminal and execute:
1
sudo nmap -sC -sV <TARGET_IP> -oN nmap_scan.txt
Expected Output:
1
2
3
4
5
6
7
8
9
Starting Nmap 7.95 ( https://nmap.org )
Nmap scan report for <TARGET_IP>
Host is up (0.21s latency).
Not shown: 998 closed tcp ports (reset)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.9p1 Ubuntu 3ubuntu0.13 (Ubuntu Linux; protocol 2.0)
80/tcp open http Apache httpd 2.4.52
|_http-title: Did not follow redirect to http://conversor.htb/
Service Info: Host: conversor.htb; OS: Linux
Step 1.2: Configure DNS Resolution
The scan reveals a hostname conversor.htb. Add it to your hosts file:
1
echo "<TARGET_IP> conversor.htb" | sudo tee -a /etc/hosts
Verify it’s added:
1
tail -n 1 /etc/hosts
Expected Output:
1
<TARGET_IP> conversor.htb
Phase 2: Web Application Discovery
Step 2.1: Access the Web Application
Open your browser and navigate to:
1
http://conversor.htb
What You’ll See: You’ll be redirected to a login page at http://conversor.htb/login
Premium Content
The full exploitation walkthrough, privilege escalation, and flags are available exclusively for members.
Unlock Full Writeup → This post is licensed under CC BY 4.0 by the author.