AirTouch
HackTheBox AirTouch machine writeup — reconnaissance and enumeration walkthrough.
AirTouch
1️⃣ Reconnaissance
Target
1
10.129.20.14
Enumeration
1
nmap -A -Pn -sC -sU 10.129.20.14 -oA nmapresult
Key Observations
- 22/tcp → SSH
- 161/udp → SNMP (v2c)
- Multiple wireless interfaces present
- System identified as a wireless consultant / attack platform
The presence of SNMP combined with SSH strongly suggests credential disclosure as an initial access vector.
Premium Content
The full exploitation walkthrough, privilege escalation, and flags are available exclusively for members.
Unlock Full Writeup → This post is licensed under CC BY 4.0 by the author.