The needle

As a part of our SDLC process, we've got our firmware ready for security testing. Can you help us by performing a security assessment?

Host

159.65.24.125:32207

Looks like we need to find a password

After we have downloaded the necessary files from HackTheBox we can unzip

unzip The\ Needle.zip

we have one file

Lets run strings

strings firmware.bin > strings_output.txt

Looking at the top of the output we can see

  • seems like some kind of failure

Let's utilize binwalk as it is specifically designed for analyzing binary files and extracting information

binwalk -e firmware.bin

Now let's move into the extracted folder

Lets search for some interesting strings

grep -rn "./" -e password # alot of information
grep -rn "./" -e user
grep -rn "./" -e /etc/passwd # we find what may be a hash

possible hash, but cant crack it

6a451aa33393f47ade89b8bce4d9711818c2630394c3967265ffed276bb25a55
grep -rn "./" -e /etc/shadow

another possible hash

  • couldn't crack it

ccbbfeee2dd560403fea13f7f431ebd21d9bb4b3d41e48e892013fa451f91cc4
grep -rn "./" -e login

we do find something interesting

Lets follow this

find ./ -name sign

when we cat this file out we can see a password

possible creds

Device_Admin: qS6-X/n]u>fVfAt!

Lets see if we can access the host via netcat

nc 159.65.24.125 32207
  • we are in

Last updated