HTB / Single Host¶
Goal: Pop a single target machine — HTB box, standalone VM, or any one IP.
Do this¶
After Quick Start, in your engagement.json set:
{
"profile": "single_host",
"scope": {
"cidrs": ["10.10.10.5/32"], // your target IP
"domains": [],
"exclusions": []
}
}
Then in Claude:
"Run preflight for single_host, scan the target, and start working the frontier."
That's it. The AI will:
- Call
run_lab_preflightto verify nmap/gobuster/etc. are present. - Run
nmapagainst the target and feed XML toparse_output. - Pull the frontier and start enumerating discovered services one by one.
What you'll see in the dashboard¶
- A single
hostnode withservicenodes for each open port (RUNSedges). - Frontier items prioritized by service — often web enum first, then SMB, then anything else.
- Inference rules will flag obvious wins (anonymous SMB, default creds, known-vulnerable banners).
When you find a foothold¶
"I have a shell on the target as
www-data. Open a session and start linpeas."
The AI opens a PTY/SSH session, runs linpeas, parses the output, and starts producing privesc frontier items.
Tips¶
- The single-host profile suppresses domain-related warnings (no AD context expected).
track_processlong-running scans so they don't block the loop —check_processesreaps them.- Use
get_skill <service-name>to pull methodology before tackling something unfamiliar.
See also¶
- parse_output vs report_finding — which to use for what
- End-to-End Walkthrough — what the full arc looks like
- Session Instructions — what the AI does under the hood