Difficulty: Medium
OS: Linux (Ubuntu 24.04.4 LTS)
IP: 10.129.244.156
CVEs: CVE-2024-51482 · CVE-2025-60787
Overview
CCTV is a Linux-based HackTheBox machine built around a real-world CCTV management stack. The machine hosts a ZoneMinder instance on port 80 and an internally exposed motionEye service on localhost. The attack path chains two CVEs - a blind SQL injection to extract database credentials, followed by a command injection in a misconfigured motionEye instance running as root - resulting in a full system compromise.
Phase 1 - Reconnaissance & Enumeration
1.1 - Host Setup
Before scanning, the machine hostname was added to the local hosts file for clean resolution:
echo "10.129.244.156 cctv.htb" | sudo tee -a /etc/hosts
1.2 - Full Port Scan
A full TCP port scan was performed using Nmap with an aggressive rate to minimise scan time:
nmap -p- --min-rate 5000 -sS 10.129.244.156
Output:
Starting Nmap 7.98 ( https://nmap.org ) at 2026-03-09 21:59 +0530
Nmap scan report for cctv.htb (10.129.244.156)
Host is up (1.1s latency).
Not shown: 52062 closed tcp ports (reset), 13471 filtered tcp ports (no-response)
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
Nmap done: 1 IP address (1 host up) scanned in 111.86 seconds
Only two ports were exposed externally - SSH (22) and HTTP (80). The attack surface is intentionally minimal, which points to a web-first approach.
1.3 - Service Version Detection
nmap -sV -sC -T4 10.129.244.156
Output:
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 9.6p1 Ubuntu 3ubuntu13.14 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
|_ 256 76:1d:73:98:fa:05:f7:0b:04:c2:3b:c4:7d:e6:db:4a (ECDSA)
80/tcp open http Apache httpd 2.4.58
|_http-title: SecureVision CCTV & Security Solutions
Service Info: Host: default; OS: Linux; CPE: cpe:/o:linux:linux_kernel
Key findings:
Apache 2.4.58 hosting a site titled SecureVision CCTV & Security Solutions
OpenSSH 9.6p1 on Ubuntu 24.04
🔐 PREMIUM WRITEUP - MEMBERSHIP REQUIRED
This machine is still active in HTB, so the full walkthrough, exploitation path, and flags cannot be publicly released.
But you can access the entire premium writeup right now.
🌟 Get Instant Access
Unlock the complete step-by-step solution, techniques used, notes, and exclusive insights by becoming a member.
Why Go Premium?
Early access to full detailed writeups
Passwords for active CTF solutions
Advanced exploitation techniques
Upgrade once - unlock everything instantly.
Keep hacking, keep learning, keep winning. 🎯

