Note-Taking Template for HTB Machines
Structured template for documenting your HTB machine progress.
Template
# [Machine Name] - [OS] - [Difficulty]
## Target: 10.10.10.X
## Recon
### Nmap
[Paste full nmap output]
### Open Ports Summary
| Port | Service | Version |
|------|---------|---------|
| 22 | SSH | OpenSSH 8.9p1 |
| 80 | HTTP | Apache 2.4.52 |
### Findings
- [ ] Finding 1
- [ ] Finding 2
## Web (Port 80)
### Technology
- Server:
- Framework:
- CMS:
### Directory Brute Force
[Paste gobuster output]
### Interesting Endpoints
- /admin - Login page
- /api - API endpoint
### Credentials Found
| Username | Password | Where Found |
|----------|----------|-------------|
| admin | password | config file |
## Foothold
### Vulnerability
[Description]
### Exploit
[Commands and output]
### Shell Obtained
- User: www-data
- Method: reverse shell via RCE
## User
### Lateral Movement
[How you got from www-data to user]
### User Flag
user.txt: [flag]
## Privilege Escalation
### Enumeration Findings
- sudo -l: [output]
- SUID: [findings]
- Cron: [findings]
### Exploit
[Commands and output]
### Root Flag
root.txt: [flag]
## Loot
- Credentials:
- SSH keys:
- Hashes:
## Lessons Learned
1.
2.
3.
Tips
- Copy-paste command output liberally
- Screenshot anything visual (web pages, BloodHound graphs)
- Note dead ends too - helps avoid repeating them
- Track time spent on each phase
- Save any custom scripts you write