HTB: PermX Writeup

Machine Information
| Attribute | Details |
|---|---|
| Name | PermX |
| OS | Linux |
| Difficulty | Easy |
| Points | N/A |
| Release Date | N/A |
| IP Address | N/A |
| Author | D3vnomi |
Machine Rating
⭐⭐☆☆☆ (4.0/10)
Difficulty Assessment:
- Enumeration: ⭐⭐☆☆☆
- Real-world: ⭐⭐☆☆☆
- CVE: ⭐☆☆☆☆
- CTF-like: ⭐⭐☆☆☆
Summary
PermX is an Easy-difficulty Linux machine. Note: The source notes for this machine were not available at the time of writing — the notes file contained detailed information for a different machine (SolarLab) instead. This writeup serves as a template skeleton documenting the machine’s metadata and structure.
[Notes incomplete - exploitation path not documented in source notes]
Reconnaissance
Port Scanning
[Notes incomplete - port enumeration data not documented in source notes]
nmap -sC -sV -T4 -p- <TARGET_IP>Service Enumeration
[Notes incomplete - service details not documented in source notes]
Vulnerability Assessment
[Notes incomplete - vulnerability analysis not documented in source notes]
Initial Foothold
Exploitation Path
[Notes incomplete - exploitation steps not documented in source notes]
User Compromise
Credential Discovery
[Notes incomplete - credential enumeration not documented in source notes]
User Flag
[Notes incomplete - user flag not documented in source notes]
cat ~/user.txt🚩 User Flag: <REDACTED>
Privilege Escalation
Enumeration
[Notes incomplete - privilege escalation enumeration not documented in source notes]
sudo -lfind / -perm -4000 -type f 2>/dev/nullps aux | grep -E "python|java|node|php|ruby"Exploitation (Root/Administrator)
[Notes incomplete - privilege escalation technique not documented in source notes]
Root Flag
[Notes incomplete - root flag not documented in source notes]
cat /root/root.txt🚩 Root Flag: <REDACTED>
Attack Chain Summary
[Notes incomplete - attack chain not documented in source notes]
graph TD A[Reconnaissance] --> B[Initial Foothold] B --> C[User Compromise] C --> D[Privilege Escalation] D --> E[Root Access]Tools Used
| Tool | Purpose |
|---|---|
nmap | Port scanning and service fingerprinting |
gobuster | Directory and subdomain enumeration |
ffuf | Web fuzzing and subdomain enumeration |
burp | HTTP request interception and modification |
hydra | Online brute-force attacks |
metasploit | Exploitation framework |
nc | Reverse shell listener |
python3 | Scripting and exploit execution |
searchsploit | Exploit database search |
Key Learnings
- Thorough enumeration is critical — every open port and service can be a potential entry point.
- Credential extraction from various sources enables lateral movement and privilege escalation.
- Privilege escalation frequently depends on misconfigurations rather than software vulnerabilities.
Author
D3vnomi
Disclaimer
This writeup is for educational purposes only. All activities described were performed in a controlled, legal environment (HackTheBox platform). Unauthorized access to computer systems is illegal.
Last Updated: 08 Mar 2026
Status: Skeleton template (source notes corrupted/missing)
Tags: #HackTheBox #Linux #Easy