Planning Writeup
Writeup for Hack The Box Easy Machine Planning (My First Writeup)
Planning Writeup
Planning Machine
This machine is about subdomain enumeration and an grafana vulnerability in it’s version. I will show the whole process to discover the user and root flag.
Enumerate services
Running nmap to enumerate services and ports running on the box.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
┌──(mvthul㉿kali01)-[~/HTB/machines/planning]
└─$ cat nmap/planning.nmap
# Nmap 7.95 scan initiated Sun Jun 8 16:37:09 2025 as: /usr/lib/nmap/nmap -sC -sV -T5 -oA nmap/planning 10.10.11.68
Nmap scan report for 10.10.11.68
Host is up (0.0088s latency).
Not shown: 998 closed tcp ports (reset)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 9.6p1 Ubuntu 3ubuntu13.11 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 256 62:ff:f6:d4:57:88:05:ad:f4:d3:de:5b:9b:f8:50:f1 (ECDSA)
|_ 256 4c:ce:7d:5c:fb:2d:a0:9e:9f:bd:f5:5c:5e:61:50:8a (ED25519)
80/tcp open http nginx 1.24.0 (Ubuntu)
|_http-server-header: nginx/1.24.0 (Ubuntu)
|_http-title: Did not follow redirect to http://planning.htb/
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sun Jun 8 16:37:16 2025 -- 1 IP address (1 host up) scanned in 7.23 seconds
This box is still active on HackTheBox. Once retired, this article will be published for public access as per HackTheBox’s policy on publishing content from their platform.
For more hints and assistance, come chat with me and the rest of your peers in the HackTheBox Discord server.
This post is licensed under CC BY 4.0 by the author.
