HTB: stocker Writeup

Machine Information

AttributeDetails
Namestocker
OSLinux
DifficultyEasy
PointsN/A
Release DateN/A
IP Address10.129.x.x

Summary

stocker is an Easy-difficulty Linux machine from HackTheBox. This writeup documents the reconnaissance, exploitation, and privilege escalation phases needed to compromise the target system.

Note: Source documentation for this machine is incomplete. The sections below serve as a template placeholder until detailed exploitation notes are available.


Reconnaissance

Port Scanning

[Notes incomplete - port scan data not documented in source notes]

Terminal window
nmap -sC -sV -T4 -p- 10.129.x.x

Service Enumeration

[Notes incomplete - service enumeration path not documented in source notes]

Hostname Resolution

Terminal window
echo "10.129.x.x stocker.htb" >> /etc/hosts

Initial Foothold

[Notes incomplete - exploitation path not documented in source notes]


User Compromise

Credential Discovery

[Notes incomplete - credential discovery method not documented in source notes]

User Flag

[Notes incomplete - user flag exploitation path not documented in source notes]


Privilege Escalation

Enumeration

[Notes incomplete - privilege escalation vector not documented in source notes]

Terminal window
sudo -l
find / -perm -4000 -type f 2>/dev/null
ps aux

Root Flag

[Notes incomplete - root flag exploitation path not documented in source notes]


Attack Chain Summary

[Notes incomplete - attack chain not documented in source notes]


Tools Used

ToolPurpose
nmapPort scanning and service enumeration

Key Takeaways

  • Systematic reconnaissance is essential for identifying entry points
  • Service enumeration should precede exploitation attempts
  • Credential reuse is common across systems
  • Privilege escalation often requires careful enumeration of system configurations

Disclaimer

This writeup is for educational purposes only. All activities described are performed in controlled, legal environments (HackTheBox platform). Unauthorized access to computer systems is illegal.


Last Updated: 08 Mar 2026

Tags: #HackTheBox #Linux #Easy #Incomplete