Hack The Box - HTB Helix Writeup - Medium- Weekly - May 8th, 2026

Hack The Box - HTB Helix  Writeup - Medium- Weekly - May 8th, 2026

HTB Write-up: Helix

OS: Linux
Difficulty: Medium


1. Executive Summary

Helix is a lab that simulates a realistic industrial control systems (ICS/SCADA) environment.

  • Target IP: [TARGET_IP]
  • Attacker IP: [ATTACKER_IP]

2. Reconnaissance

2.1 Nmap Port Scanning

I started by scanning the target for open ports and services:

nmap -p- -sV -sC -T4 [TARGET_IP]

The scan revealed:

  • 22/tcp — OpenSSH 8.9p1 Ubuntu 3ubuntu0.10
  • 80/tcp — Nginx HTTP
  • 8080/tcp — Apache NiFi

During virtual host enumeration using ffuf, I identified flow.helix.htb as a host pointing to the NiFi management interface. I added the hostname to /etc/hosts and accessed it through the browser.


3. Initial Access

3.1 Apache NiFi 1.21.0 Analysis

Visiting http://flow.helix.htb:8080/nifi exposed a NiFi instance that allowed the creation of controller services and processors. This represented a serious misconfiguration.

The goal was to abuse the ExecuteSQL processor for remote code execution. NiFi supports multiple database backends. On the target, an H2 Database JAR was present at /opt/nifi-1.21.0/lib/h2-2.1.214.jar. H2 is known for supporting Java aliases that can be abused to run arbitrary Java code.