HTB Starting Point Tier 2 builds on the skills of Tier 0 and Tier 1 by introducing more complex web vulnerabilities, horizontal privilege escalation, JWT exploitation, advanced LFI and XXE techniques, and privilege escalation via SUID binaries and misconfigurations.
The goal is to expand your ability to exploit real-world web applications and perform effective post-exploitation on Linux systems.
Archetype
SMB enumeration → credential reuse → WinRM foothold
Oopsie
File upload vulnerability → RCE via uploaded PHP shell
Vaccine
Local File Inclusion (LFI) → Privilege escalation via sudo misconfiguration
Unified
JWT cracking → Admin access → Reverse shell
Included
XXE injection → LFI → RCE via malicious XML payload
Markup
LFI exploitation → Reading sensitive files → SSH access
Base
Privilege escalation via SUID binary → Root shell
Tier 2 represents a jump in difficulty compared to earlier tiers:
Completing Tier 2 gives a solid foundation for moving into Retired and Academy boxes where you’ll encounter these techniques regularly.
Writeup by inksec
GitHub: [https://github.com/inkedqt]