4 min to read
HackTheBox - OpenAdmin
HackTheBox Walkthrough - OpenAdmin
Hello Guys , I am Faisal Husaini. My username on HTB is ferllen. Also join me on discord.
The IP of this box is 10.10.10.171
Port Scan
Running nmap full port scan on it , we get

We get only 2 Open Ports running SSH and Apache Web Server
Web Part
The main root directory in the web part gave us default Apache webpage so we move onto Gobuster the web

We got few entries, one of which was /music, looking further into it

We see a webpage, clicking on the Login option

We get redirected to /ona/ page, we can see that it is running OpenNetAdmin v18.1.1
Searching for exploits on searchsploit

We get 2 exploitings for the existing version, we use the script instead of metasploit
Getting the script to our box and then checking the contents of it

We just use the curl command in it, but we change the $CMD to the command of our desire

Here we use the curl command to ping to our local machine

As we can see that we got pinged back successfully

Now we upload a PHP reverse shell through the above command

Now we access the reverse shell php script and then check the netcat listener

We got reverse shell as www-data user, upon enumerating more

We see a database_settings php script on the /opt/ona/www/local/config folder and inside of that script , we get a password so we use it for user jimmy through SSH

We connected to jimmy user through SSH successfully

Running the id command , we see that we are groups with 1002(internal)
Checking for files with group permission internal

We get /var/www/html folder and some php files with the group permission of it

Checking the contents of main.php we see that it runs shell_exec function which will cat the id_rsa file of joanna
But we didnt see any web stuff running other than what we got before, so checking for open ports listening locally

We see that port 52846 is open and listening, so we port forward it to our local machine through SSH

We port forwarded to our local machine, now we check the port in the web browser

We get redirected to login page login.php, as we remember that there was a php file in /var/www/internal/login.php, checking the contents of the file

We see that we have a username and password, but the password is SHA512 encrypted so we use an online decrypter for it

We decrypted the password,i.e, Revealed
We now login and then get redirected to main.php which reveals SSH Key

We see that it is encrypted SSH keys, we run sshng2john and saved it to a file

We now use john to crack the passphrase

We cracked the passphrase successfully,i.e, bloodninjas
Now we connect to user joanna through SSH

Connection successfully through SSH with user joanna and now move onto getting the user flag

Now time for privilege escalation
Privilege Escalation
Running sudo -l command

We see that user joanna can run /bin/nano on /opt/priv with sudo without password
We run the command and then move further to get shell as root
We press CTRL+R and then CTRL+X

We can see we get prompted to put command to execute
We run reset; sh 1>&0 2>&0 and then press Enter

We got shell as root, which we can confirm down below too

Now moving onto getting root flag

Comments