Hey everyone! Today I'm sharing how I solved the Footprinting Lab — Easy on Hack The Box. This lab is all about enumerating services and finding a flag. The scenario says we have an internal DNS server to investigate, and we already have some credentials: ceil:qwer1234. Also, the employees were talking about SSH keys. Let's dive in.
Step 1: Scanning the target
I started with a quick Nmap scan to see what's open.
nmap -sV -sC 10.129.1.87
The important open ports were:
- 22/tcp — SSH
- 53/tcp — DNS
- 2121/tcp — FTP
- … and a few others.
Step 2: Logging into FTP
ftp 10.129.1.87 2121When asked, I entered:
- Username:
ceil - Password:
qwer1234

And I was in! The FTP server had a home directory with some files. I started looking around.
Step 3: Hunting for SSH keys
I remembered the note about SSH keys. Inside the user's home, I found a hidden .ssh folder. I changed into it and listed the files:
cd .ssh
lsThere it was: id_rsa — the private key for SSH. I downloaded it to my local machine:
get id_rsaThen I exited FTP and set the right permissions for the key:
chmod 600 id_rsaStep 4: Connecting via SSH
Now I used the key to log in as ceil:
ssh -i id_rsa ceil@10.129.1.87

It worked without asking for a password. I was inside the server!
Step 5: Finding the flag
I started searching for the flag file. A simple find command did the trick:
find / -name "flag.txt" 2>/dev/nullIt showed the path (something like /home/ceil/flag.txt). I read it:
cat /home/ceil/flag.txt
And there it was: HTB{7nrzise7hednrxihskjed7nzrgkweunj47zngrhdbkjhgdfbjkc7hgj}

That's it! I hope this writeup helps someone. If you have questions, feel free to ask. Happy hacking!