DevArea
HackTheBox DevArea machine writeup — reconnaissance and enumeration walkthrough.
DevArea
Table of Contents
- Reconnaissance
- Foothold - Apache CXF LFI via CVE-2022-46364
- Initial Access - Hoverfly Middleware RCE
- Privilege Escalation - World-Writable Bash
- Summary & Key Takeaways
Reconnaissance
Host Setup
Add the machine to /etc/hosts for hostname resolution:
1
echo "10.129.17.5 devarea.htb" | sudo tee -a /etc/hosts
Port Scan
1
nmap -sS -sV 10.129.17.5
Results:
| Port | Service | Version / Notes |
|---|---|---|
| 21 | FTP | vsftpd 3.0.5 |
| 22 | SSH | OpenSSH 9.6p1 Ubuntu |
| 80 | HTTP | Apache httpd 2.4.58 - static frontend |
| 8080 | HTTP | Jetty 9.4.27 - Apache CXF SOAP service |
| 8500 | HTTP Proxy | Hoverfly forward proxy |
| 8888 | HTTP API | Hoverfly admin API (Go HTTP server) |
The interesting attack surface is port 8080 (Apache CXF - known vulnerable to CVE-2022-46364) and ports 8500/8888 (Hoverfly proxy and admin interface).
Premium Content
The full exploitation walkthrough, privilege escalation, and flags are available exclusively for members.
Unlock Full Writeup → This post is licensed under CC BY 4.0 by the author.