HackTheBox Conversor Writeup
A walkthrough of the HackTheBox 'Conversor' machine. This write-up covers initial access, privilege escalation, and post-exploitation techniques.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
┌──(dollarboysushil㉿kali)-[~/Documents/HTB_BOXES/conversor]
└─$ nmap -sC -sV 10.129.55.20
Starting Nmap 7.95 ( https://nmap.org ) at 2025-10-25 15:01 EDT
Nmap scan report for 10.129.55.20
Host is up (0.28s latency).
Not shown: 998 closed tcp ports (reset)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.9p1 Ubuntu 3ubuntu0.13 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 256 01:74:26:39:47:bc:6a:e2:cb:12:8b:71:84:9c:f8:5a (ECDSA)
|_ 256 3a:16:90:dc:74:d8:e3:c4:51:36:e2:08:06:26:17:ee (ED25519)
80/tcp open http Apache httpd 2.4.52
|_http-server-header: Apache/2.4.52 (Ubuntu)
|_http-title: Did not follow redirect to http://conversor.htb/
Service Info: Host: conversor.htb; OS: Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 331.03 seconds
Secured
Active HackTheBox Challenge
This challenge is currently active on HackTheBox. According to HTB's content policy, sharing writeups of active challenges is prohibited.
This writeup will be made publicly available once the challenge is retired.
This post is licensed under
CC BY 4.0
by the author.
