Post

DevArea

HackTheBox DevArea machine writeup — reconnaissance and enumeration walkthrough.

DevArea

Table of Contents

  1. Reconnaissance
  2. Foothold - Apache CXF LFI via CVE-2022-46364
  3. Initial Access - Hoverfly Middleware RCE
  4. Privilege Escalation - World-Writable Bash
  5. Summary & Key Takeaways

Reconnaissance

Host Setup

Add the machine to /etc/hosts for hostname resolution:

1
echo "10.129.17.5  devarea.htb" | sudo tee -a /etc/hosts

Port Scan

1
nmap -sS -sV 10.129.17.5

Results:

PortServiceVersion / Notes
21FTPvsftpd 3.0.5
22SSHOpenSSH 9.6p1 Ubuntu
80HTTPApache httpd 2.4.58 - static frontend
8080HTTPJetty 9.4.27 - Apache CXF SOAP service
8500HTTP ProxyHoverfly forward proxy
8888HTTP APIHoverfly admin API (Go HTTP server)

The interesting attack surface is port 8080 (Apache CXF - known vulnerable to CVE-2022-46364) and ports 8500/8888 (Hoverfly proxy and admin interface).



🔒

Premium Content

The full exploitation walkthrough, privilege escalation, and flags are available exclusively for members.

Unlock Full Writeup →
This post is licensed under CC BY 4.0 by the author.