HTB: stocker Writeup
Machine Information
| Attribute | Details |
|---|---|
| Name | stocker |
| OS | Linux |
| Difficulty | Easy |
| Points | N/A |
| Release Date | N/A |
| IP Address | 10.129.x.x |
Summary
stocker is an Easy-difficulty Linux machine from HackTheBox. This writeup documents the reconnaissance, exploitation, and privilege escalation phases needed to compromise the target system.
Note: Source documentation for this machine is incomplete. The sections below serve as a template placeholder until detailed exploitation notes are available.
Reconnaissance
Port Scanning
[Notes incomplete - port scan data not documented in source notes]
nmap -sC -sV -T4 -p- 10.129.x.xService Enumeration
[Notes incomplete - service enumeration path not documented in source notes]
Hostname Resolution
echo "10.129.x.x stocker.htb" >> /etc/hostsInitial Foothold
[Notes incomplete - exploitation path not documented in source notes]
User Compromise
Credential Discovery
[Notes incomplete - credential discovery method not documented in source notes]
User Flag
[Notes incomplete - user flag exploitation path not documented in source notes]
Privilege Escalation
Enumeration
[Notes incomplete - privilege escalation vector not documented in source notes]
sudo -lfind / -perm -4000 -type f 2>/dev/nullps auxRoot Flag
[Notes incomplete - root flag exploitation path not documented in source notes]
Attack Chain Summary
[Notes incomplete - attack chain not documented in source notes]
Tools Used
| Tool | Purpose |
|---|---|
nmap | Port scanning and service enumeration |
Key Takeaways
- Systematic reconnaissance is essential for identifying entry points
- Service enumeration should precede exploitation attempts
- Credential reuse is common across systems
- Privilege escalation often requires careful enumeration of system configurations
Disclaimer
This writeup is for educational purposes only. All activities described are performed in controlled, legal environments (HackTheBox platform). Unauthorized access to computer systems is illegal.
Last Updated: 08 Mar 2026
Tags: #HackTheBox #Linux #Easy #Incomplete