HTB: napper Writeup

Machine Banner

Machine Information

AttributeDetails
Namenapper
OSWindows
DifficultyHard
PointsN/A
Release DateN/A
IP Address10.10.11.240
AuthorD3vnomi

Machine Rating

⭐⭐⭐⭐☆ (8.0/10)

Difficulty Assessment:

  • Enumeration: ⭐⭐⭐⭐☆
  • Real-world: ⭐⭐⭐⭐☆
  • CVE: ⭐⭐⭐☆☆
  • CTF-like: ⭐⭐⭐⭐☆

Summary

napper is a Hard-difficulty Windows machine. Documentation of the attack is limited to initial reconnaissance activities. The subdomain enumeration phase identified three distinct domains (napper.htb, app.napper.htb, and internal.napper.htb) through automated fuzzing. Further exploitation details are not documented in the available notes.

TL;DR: Enumeration (Subdomains discovered) → [Exploitation path incomplete]


Reconnaissance

Domain Discovery

The primary domain identified during reconnaissance:

napper.htb

Port Scanning

Terminal window
nmap -sC -sV 10.10.11.240

Results: Port scan targeting app.napper.htb was performed with service version detection enabled.

Subdomain Enumeration

Subdomain fuzzing was conducted using ffuf to discover additional hosts:

Terminal window
ffuf -u "https://napper.htb" -H "Host: FUZZ.napper.htb" -w subdomains-top1million-20000.txt -c -t 50 -fs 5602

Subdomains Discovered:

  • napper.htb
  • app.napper.htb
  • internal.napper.htb

Hosts File Configuration

All discovered domains were added to the local hosts file for DNS resolution:

Terminal window
echo "10.10.11.240 napper.htb app.napper.htb internal.napper.htb" >> /etc/hosts

Initial Foothold

Exploitation Path

[Notes incomplete - exploitation path not documented in source notes]

The reconnaissance phase identified three domains and confirmed service availability, but the notes do not contain documentation of the actual exploitation technique or initial foothold achievement.


User Compromise

Credential Discovery

[Notes incomplete - user compromise path not documented in source notes]

No credentials or user account compromise details are documented in the available notes.

User Flag

[Notes incomplete - user flag not documented in source notes]


Privilege Escalation

Enumeration

[Notes incomplete - privilege escalation path not documented in source notes]

No privilege escalation details are documented in the available notes.

Root Flag

[Notes incomplete - root flag not documented in source notes]


Attack Chain Summary

Based on the documented reconnaissance:

  1. Subdomain Enumeration - Identified three domains using ffuf fuzzing
  2. DNS Resolution - Updated hosts file with discovered subdomains
  3. Further Exploitation - [Documentation incomplete]

Tools Used

ToolPurpose
nmapPort scanning and service fingerprinting
ffufWeb fuzzing and subdomain enumeration

Key Learnings

Based on the documented reconnaissance phase:

  • Subdomain Enumeration: Automated fuzzing with ffuf can efficiently discover additional attack surface beyond the primary domain.
  • Virtual Hosting: Web applications often serve different content on subdomains, making subdomain discovery critical for comprehensive reconnaissance.
  • Hosts File Configuration: Local DNS resolution enables proper testing of virtual-hosted services during penetration testing.

Note: Further learning opportunities from exploitation and privilege escalation phases are not available in the current documentation.


Author

D3vnomi


Disclaimer

This writeup is for educational purposes only. All activities described were performed in a controlled, legal environment (HackTheBox platform). Unauthorized access to computer systems is illegal.


Last Updated: 08 Mar 2026

Tags: #HackTheBox #Windows #Hard