4th October 2025 — HTB: Unified (Tier 2) Write-up
Today I set up this website to track my cybersecurity journey. I'm currently working through all Hack The Box Starting Point tiers (Tier 0, Tier 1, and Tier 2). On this day, I completed the Tier 2 lab called Unified. Below is a detailed summary of how I completed it:
Step 1: Start & Connect
I launched the machine, connected via the VPN, and verified connectivity by pinging the target IP.
Step 2: Reconnaissance
Initially, browsing to the IP gave nothing, so I ran an nmap -A
scan. This revealed ports 22, 6789, 8080, and 8443 open. On port 8443 I found a UniFi login portal.
Step 3: Research Vulnerability
Based on the UniFi version, I found it was vulnerable to Log4Shell (CVE-2021-44228). This affects the remember parameter in login requests.
Step 4: Testing the Vulnerability
Using Burp Suite, I intercepted a login request, modified the remember
parameter with a JNDI payload, and confirmed the target attempted an LDAP lookup to my controlled host (visible in tcpdump
).
Step 5: Exploitation
I set up RogueJNDI and crafted a Base64‑encoded Bash reverse shell payload. After starting a listener with nc -lvp 4444
, I triggered the exploit and received a reverse shell on the target.
Step 6: User Flag
Enumerating the filesystem, I located and captured the user.txt
flag in Michael’s home directory.
Step 7: Privilege Escalation
Checking running processes revealed MongoDB on port 27117. The UniFi application stores credentials in the ace
database. I updated the admin password to Password1234
using Mongo commands, then re‑hashed it with SHA‑512 to match the format. This allowed me to log into the UniFi admin dashboard in the browser.
Step 8: Root Flag
From the dashboard, I found SSH credentials: root:NotACrackablePassword4U2022
. Using SSH I logged in as root and captured the final root.txt
flag.
This challenge taught me a lot about exploiting Log4j (Log4Shell), using RogueJNDI, and leveraging MongoDB to escalate privileges. It was a solid Tier 2 box combining reconnaissance, web exploitation, and post‑exploitation skills.
Hack The Box
Starting Point
Unified
Log4Shell
Writeup