๐UnderPass
https://app.hackthebox.com/machines/UnderPass
Recon
Nmap-Scan
โ UnderPass sudo nmap -vv -sV -sC 10.10.11.48
..
PORT STATE SERVICE REASON VERSION
22/tcp open ssh syn-ack ttl 63 OpenSSH 8.9p1 Ubuntu 3ubuntu0.10 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 256 48:b0:d2:c7:29:26:ae:3d:fb:b7:6b:0f:f5:4d:2a:ea (ECDSA)
| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBK+kvbyNUglQLkP2Bp7QVhfp7EnRWMHVtM7xtxk34WU5s+lYksJ07/lmMpJN/bwey1SVpG0FAgL0C/+2r71XUEo=
| 256 cb:61:64:b8:1b:1b:b5:ba:b8:45:86:c5:16:bb:e2:a2 (ED25519)
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJ8XNCLFSIxMNibmm+q7mFtNDYzoGAJ/vDNa6MUjfU91
80/tcp open http syn-ack ttl 63 Apache httpd 2.4.52 ((Ubuntu))
|_http-title: Apache2 Ubuntu Default Page: It works
| http-methods:
|_ Supported Methods: OPTIONS HEAD GET POST
|_http-server-header: Apache/2.4.52 (Ubuntu)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernelWebsite
As the scan already reveals we got a Apache2 Default Page

Nmap Udp-scan
Snmp
We find a user steve@underpass.htb with snmpbulkwalk and daloradius server
User
Dolaradius-Server
Checking the Website we are getting a 403

Doing a dirscan using feroxbuster(alias function)

Default Creds for daloradius

The config reveals the db user and password
We find a password hash at the user management panel

Crackstation gives us the answer for this md5 hash underwaterfriends

Root
Last updated