Netmon-htb [ Newest ]

is an "Easy" rated Windows machine on Hack The Box that focuses on misconfigurations and information disclosure within the PRTG Network Monitor application. Phase 1: Initial Enumeration

To gain administrative access, you must move from FTP to the web interface:

You can log in via FTP using the username anonymous and no password. netmon-htb

For finding PRTG-specific RCE exploits.

A standard scan with Nmap typically reveals several open ports, including: Allows anonymous login. Port 80 (HTTP): Hosts a PRTG Network Monitor login page. Port 135/445 (RPC/SMB): Standard Windows networking ports. Phase 2: User Access (FTP & Information Disclosure) is an "Easy" rated Windows machine on Hack

Once logged in as an administrator on the PRTG dashboard, you can exploit the "Notifications" feature. By creating a new notification that executes a malicious .ps1 or .bat file, you can trigger a reverse shell or create a new admin user. Tools Used Nmap: For port scanning and service identification. FTP Client: To browse the file system anonymously.

If the 2018 password fails on the live login page, updating it to the current year (e.g., PrTg@dmin2019 ) often works, as highlighted by Faisal Husaini . A standard scan with Nmap typically reveals several

To log in once administrative credentials or a new user have been established. HackTheBox Writeup — Netmon - Faisal Husaini

×
Any questions?