UnderPass
Writeup of UnderPass machine

Reconnaissance
Nmap Scanning Process
UDP Port Scan
SNMP Check
Simple Network Management Protocol (SNMP) uses User Datagram Protocol (UDP) to transport messages and manage network-connected devices.
It shows that our target, UnDerPass.htb, is a daloRADIUS server, which can be found in the GitHub repository. The default path for this web application is /daloradius. This will serve as the main directory used in further fuzz.

/daloradiusThe /daloradius/app directory seemed to be interesting. Let's dig it further.
We have received a link to a login page that is running daloRADIUS version 2.2 beta.

The default password of the dalo Radius can be found here.
username: administrator
password: radius
User Flag
Logged In
I found a user from the Users Listing and tried to connect through port 22. But, first it's important to decode this MD5 hashed password: 412DD...

I rapidly utilized Hashcat to decrypt it. Feel free to choose any tool you prefer.
Password of user svcMosh
Connecting through the ssh port
Root Flag
If we seek the permissions of user
First, let's define what is the Most Server.
Mosh (mobile shell) is a remote terminal application that supports intermittent connectivity, allows roaming, and speculatively and safely echoes user keystrokes for better interactive response over high-latency paths. We're given this server as an ELF 64-bit LSB pie executable file.
By accessing through the most server, we can login as a root.
The following command lets us to implement the plan.

The End!!! 🔚
Thank you!!! 🙏
Last updated
