HackTheBox Writeup — OpenAdmin

Hello Guys , I am Faisal Husaini. My username on HTB is “kNgF” . Also join me on discord.

The IP of this box is

Running nmap full port scan on it , we get

We get only 2 Open Ports running SSH and Apache Web Server

The main root directory in the web part gave us default Apache webpage so we move onto Gobuster the web

We got few entries, one of which was /music, looking further into it

We see a webpage, clicking on the Login option

We get redirected to /ona/ page, we can see that it is running OpenNetAdmin v18.1.1

Searching for exploits on searchsploit

We get 2 exploitings for the existing version, we use the script instead of metasploit

Getting the script to our box and then checking the contents of it

We just use the curl command in it, but we change the $CMD to the command of our desire

Here we use the curl command to ping to our local machine

As we can see that we got pinged back successfully

Now we upload a PHP reverse shell through the above command

Now we access the reverse shell php script and then check the netcat listener

We got reverse shell as www-data user, upon enumerating more

We see a database_settings php script on the /opt/ona/www/local/config folder and inside of that script , we get a password so we use it for user jimmy through SSG

We connected to jimmy user through SSH successfully

Running the id command , we see that we are groups with 1002(internal)

Checking for files with group permission internal

We get /var/www/html folder and some php files with the group permission of it

Checking the contents of main.php we see that it runs shell_exec function which will cat the id_rsa file of joanna

But we didnt see any web stuff running other than what we got before, so checking for open ports listening locally

We see that port 52846 is open and listening, so we port forward it to our local machine through SSH

We port forwarded to our local machine, now we check the port in the web browser

We get redirected to login page login.php, as we remember that there was a php file in /var/www/internal/login.php, checking the contents of the file

We see that we have a username and password, but the password is SHA512 encrypted so we use an online decrypter for it

We decrypted the password,i.e, Revealed

We now login and then get redirected to main.php which reveals SSH Key

We see that it is encrypted SSH keys, we run sshng2john and saved it to a file

We now use john to crack the passphrase

We cracked the passphrase successfully,i.e, bloodninjas

Now we connect to user joanna through SSH

Connection successfully through SSH with user joanna and now move onto getting the user flag

Now time for privilege escalation

Running sudo -l command

We see that user joanna can run /bin/nano on /opt/priv with sudo without password

We run the command and then move further to get shell as root

We press CTRL+R and then CTRL+X

We can see we get prompted to put command to execute

We run reset; sh 1>&0 2>&0 and then press Enter

Hacker | Bug Hunter | Python Coder | Gamer | Reverse Engineering Lover

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store