This file provides a complete exploitation walkthrough for the "Outbound Mail" machine on Hack The Box (HTB). It covers initial VPN setup, reconnaissance, exploiting Roundcube Webmail via CVE-2025-49113 for remote code execution (RCE), privilege escalation to user via database credential extraction, and root escalation using CVE-2025-27591 (Below Symlink Attack).

1. Preparation & Recon

1.1 Connect to VPN

sudo openvpn --config /path/to/htb.ovpn

1.2 /etc/hosts Configuration

Add the host (replace IP if your instance is different):

echo "10.10.11.XXX mail.outbound.htb" | sudo tee -a /etc/hosts

2. Initial Enumeration

2.1 Nmap Scan

nmap -sC -sV -oN nmap.txt mail.outbound.htb

Open ports:

  • 22 (SSH)

  • 80 (HTTP)

🔐 MACHINE STILL ACTIVE

This machine is currently active on Hack The Box.

As per HTB policy, the complete walkthrough (exploitation & flags) will be published AFTER this machine is retired by HTB (~30-60 days after release).

In the meantime:

✓ Try solving it yourself!
✓ Come back when it's retired for the free solution

Keep grinding! 🎯

Need Help?

Have questions while solving it? Feel free to reach out:
Email: [email protected]

Still looking for guidance? You can always explore more resources here to support your learning journey.

Your support through Ko-fi membership (https://ko-fi.com/andres__) helps create more detailed writeups faster! ❤️

Keep Reading