// htb writeup Hack The Box 2026-02-25
Vulnescape
HackTheBox Easy Hack The Box
root obtained // PWNED

🧪 VulnEscape – Hack The Box

Platform: Hack The Box
Difficulty: Easy
IP Address: 10.129.234.51
Date Completed: 2025-07-27


🧭 Overview

VulnEscape is an Easy-rated Windows machine where RDP is the sole exposed service. A user named KioskUser0 can log in via RDP with no password, but the environment is restricted by kiosk-style policies. Exploiting Microsoft Edge’s file:// scheme allows file system access, and a trick involving renaming cmd.exe to msedge.exe leads to command execution. Further privilege escalation is achieved by extracting admin credentials from a Remote Desktop Plus profile using BulletPassView. These creds are used with runas to gain a full administrator PowerShell session, bypassing UAC and retrieving the root flag.


🔍 Enumeration

🔎 Nmap

nmap -p- --min-rate 10000 10.129.234.51
nmap -p 3389 -sCV -oN nmapscan 10.129.234.51
3389/tcp open  ms-wbt-server Microsoft Terminal Services
| rdp-ntlm-info:
|   Target_Name: ESCAPE
|   NetBIOS_Domain_Name: ESCAPE
|   NetBIOS_Computer_Name: ESCAPE
|   Product_Version: 10.0.19041

🪜 Exploitation

✅ RDP Access

netexec rdp 10.129.234.51 -u KioskUser0 -p ''
xfreerdp3 /v:10.129.234.51 "/u:Escape\KioskUser0" /p:""

This gives access to a restricted desktop environment.

🗂️ Kiosk Escape


⚙️ Privilege Escalation

runas /user:admin powershell
start-process powershell -verb runas

🎯 Root Flag

root.txt
5c38d518996a362275e756ddbab14513

🧠 Lessons Learned


📸 Proof

vulnescape.png