Netmon-htb 〈COMPLETE〉
is an "Easy" rated Windows machine on Hack The Box that focuses on misconfigurations and information disclosure within the PRTG Network Monitor application. Phase 1: Initial Enumeration
The quickest path to the user flag involves the FTP service: netmon-htb
Once logged in as an administrator on the PRTG dashboard, you can exploit the "Notifications" feature. By creating a new notification that executes a malicious .ps1 or .bat file, you can trigger a reverse shell or create a new admin user. Tools Used Nmap: For port scanning and service identification. FTP Client: To browse the file system anonymously. is an "Easy" rated Windows machine on Hack
Searching through the PRTG configuration files (typically in C:\ProgramData\Paessler\PRTG Network Monitor ) reveals backup configuration files. Phase 3: Privilege Escalation (PRTG Exploitation) Tools Used Nmap: For port scanning and service
This provides read access to the C:\Users\Public directory, where the user.txt flag is often located.
You can log in via FTP using the username anonymous and no password.
In an old configuration backup (e.g., PRTG Configuration.old.bak ), you may find a password like PrTg@dmin2018 .




