underlineUnderPass

Writeup of UnderPass machine

UnderPass
Link

Reconnaissance

Nmap Scanning Process

UDP Port Scan

circle-info

Open UDP port: 161, and you can see that there is a SNMPservice opened

SNMP Check

Simple Network Management Protocol (SNMP) uses User Datagram Protocol (UDP) to transport messages and manage network-connected devices.

It shows that our target, UnDerPass.htb, is a daloRADIUS server, which can be found in the GitHub repositoryarrow-up-right. The default path for this web application is /daloradius. This will serve as the main directory used in further fuzz.

exposing/daloradius
circle-info

Noting interesting things in the port 80. So, I tried to fuzz directories.

The /daloradius/app directory seemed to be interesting. Let's dig it further.

We have received a link to a login page that is running daloRADIUS version 2.2 beta.

daloRADIUS login

The default password of the dalo Radius can be found herearrow-up-right.

username: administrator

password: radius

User Flag

Logged In

I found a user from the Users Listing and tried to connect through port 22. But, first it's important to decode this MD5 hashed password: 412DD...

Users List

I rapidly utilized Hashcat to decrypt it. Feel free to choose any tool you prefer.

Password of user svcMosh

Connecting through the ssh port

Root Flag

If we seek the permissions of user

First, let's define what is the Most Server.

Mosh (mobile shell) is a remote terminal application that supports intermittent connectivity, allows roaming, and speculatively and safely echoes user keystrokes for better interactive response over high-latency paths. We're given this server as an ELF 64-bit LSB pie executable file.

By accessing through the most server, we can login as a root.

The following command lets us to implement the plan.

root

The End!!! 🔚

Thank you!!! 🙏

Last updated