Eloquia
HackTheBox Eloquia machine writeup — reconnaissance and enumeration walkthrough.
Eloquia
🎬 Act I: Discovery
The Landscape
When I first scanned Eloquia, I expected the usual sprawl of services. Instead, I found a minimalist setup—a sign of either excellent hardening or a very specific attack surface.
1
2
3
4
5
6
# The scan that started it all
nmap -sC -sV -p- --min-rate=5000 10.10.11.99
# Results:
# 80/tcp open http Microsoft IIS 10.0
# 5985/tcp open winrm Microsoft HTTPAPI 2.0
What This Tells Us:
- 🔹 Windows Server 2016/2019 (IIS 10.0)
- 🔹 WinRM enabled = potential credential attacks
- 🔹 Limited surface = need to dig deep into web apps
Virtual Host Discovery
1
2
# Add to /etc/hosts
echo "10.10.11.99 eloquia.htb qooqle.htb" | sudo tee -a /etc/hosts
Two Applications, Two Purposes:
| Application | Purpose | Tech Stack |
|---|---|---|
| eloquia.htb | Blog CMS | Django + SQLite |
| qooqle.htb | OAuth Provider | Django + OAuth2 |
Premium Content
The full exploitation walkthrough, privilege escalation, and flags are available exclusively for members.
Unlock Full Writeup → This post is licensed under CC BY 4.0 by the author.