Linux

Hack The Box - Season 10 HTB DevArea Writeup - Medium- Weekly - March 28th, 2026

Hack The Box - Season 10 HTB DevArea Writeup - Medium- Weekly - March 28th, 2026

Box Info

Property Value
Name DevArea
OS Linux (Ubuntu)
Difficulty Medium

Phase 1: Reconnaissance

Port Scan

nmap -sV -sC -p- --min-rate 5000 $TARGET
Port Service Details
21 FTP vsftpd - Anonymous login allowed
22 SSH OpenSSH
80 HTTP Apache (Ubuntu) - redirects to virtual host
8080 HTTP Jetty - SOAP/WSDL service
8500 HTTP Proxy Service virtualization proxy (requires auth)
8888 HTTP Service virtualization admin dashboard (requires auth)

Host Setup

echo "$TARGET devarea.htb" | sudo tee -a /etc/hosts

Phase 2: Enumeration

FTP (Port 21) - Anonymous Access

ftp anonymous@$TARGET
# password: anonymous
ftp> cd pub
ftp> ls
-rw-r--r--  1 ftp ftp  6445030 <date> employee-service.jar
ftp> get employee-service.jar

A Java JAR file is available for download. This is the compiled application for the SOAP service running on port 8080.

HTTP (Port 80) - Main Website

curl -sI http://$TARGET/
# HTTP/1.1 302 Found → Location: http://devarea.htb/

A static developer hiring platform. No dynamic functionality or meaningful attack surface on port 80.

HTTP (Port 8080) - SOAP Web Service

curl -s 'http://devarea.htb:8080/employeeservice?wsdl'

A SOAP web service with a single operation submitReport that accepts:

  • employeeName (string)
  • department (string)
  • content (string)
  • confidential (boolean)

Port 8500 - Service Virtualization Proxy

curl -s http://$TARGET:8500/
# "This is a proxy server. Does not respond to non-proxy requests."

curl -s --proxy http://$TARGET:8500 http://example.com
# 407 Proxy authentication required

Service virtualization proxy. Requires authentication to use.

Port 8888 - Service Virtualization Admin Dashboard

curl -sI http://$TARGET:8888/
# HTTP/1.1 200 OK → Dashboard (Angular app)

curl -sv http://$TARGET:8888/api/v2/hoverfly 2>&1 | grep HTTP
# HTTP/1.1 401 Unauthorized

The admin API requires Bearer token authentication.

JAR Analysis

Extract and decompile the downloaded JAR:

mkdir extracted && cd extracted
jar xf ../employee-service.jar

# Find application classes (under the HTB package namespace)
find . -path "*/devarea/*.class"

# Decompile to inspect
javap -c -p <package>/ServerStarter.class
# Binds to http://0.0.0.0:8080/employeeservice