Mirai HTB
IP
initial nmap scan
we have the following ports open
Lets run a more in-depth scan of the targets ports
results
we have
Looks like we have two web servers running port
80, 32400
DNS is open, maybe zone transfer
port
1255
we have UPnP (Universal Plug and Play): A networking protocol that allows compliant devices to automatically set port forwarding rules for themselves, version 1.0.5.13
First lets perform a zone transfer DNS PORT 53
come back to this
Lets check out the webserver on port 80
we are bought to a plank page
we can confirm the lighttpd version
1.4.35
Lets run feroxbuster and see if we can find anything else
We find `http://10.10.10.48/admin/
Worth looking into when we finish enumerating
Not sure what this is
**HTTP PORT 32400**
when we navigate to http://10.10.10.48:32400
we can see the following
Lets see if we can perform some feroxbusting and find anything
looks like there may be security inplace to prevent directory busting as we are getting 200s for everything
Lets create an account an inspect the request with burp
unable to create account, the application seems to be having password complications
So far our best bet is the pi-hole interface we found within the http://10.10.10.48
What is pi-hole: A network wide ad blocker designed to function as a DNS sinkhole, it primary purpose is to block any unwanted content
Most of the time these pi-hole interface's would be associated with a raspberry pie, meaning there could be a raspberry pie IoT device in the network
After a quick google search we find that the IoT device (Raspberry pi) often has SSH connection to the target server and the default credentials are
pi: raspberry
Lets see if we can SSH into the machine
we now have access as pi on the target machine
When we check our sudo privileges we can see the following
we can simple sudo su
and we are root
Now trying to find the root
when we cat out the root.txt we see the following
Looking in the /media/usb
we can see the following note
Lets see if we can create a image of the usb stick and enumerate it on our local machine
Now we can download it onto our local machine
Now we can run strings
and see if we can find anything interesting
from here we can find the flag
Last updated