Post

AirTouch

HackTheBox AirTouch machine writeup — reconnaissance and enumeration walkthrough.

AirTouch

1️⃣ Reconnaissance

Target

1
10.129.20.14

Enumeration

1
nmap -A -Pn -sC -sU 10.129.20.14 -oA nmapresult

Key Observations

  • 22/tcp → SSH
  • 161/udp → SNMP (v2c)
  • Multiple wireless interfaces present
  • System identified as a wireless consultant / attack platform

The presence of SNMP combined with SSH strongly suggests credential disclosure as an initial access vector.



🔒

Premium Content

The full exploitation walkthrough, privilege escalation, and flags are available exclusively for members.

Unlock Full Writeup →
This post is licensed under CC BY 4.0 by the author.