HTB - Wifinetic

Wifinetic is an easy difficulty Linux machine which presents an intriguing network challenge, focusing on wireless security and network monitoring.

Scope

IP Address: 10.10.11.247

Enumeration

Nmap Scan

FTP

Talk a look at backup-OpenWrt-2023-07-26.tar . I could see that it's a backup for configuration files located at /etc

So, from the file above, We can information about two Access Points and their passwords

Initial Access



Privilege Escalation

All the above capabilities are standard ones except reaver, So I will search for this tool and see what exactly it does

WIFI Protected Setup (WPS) is a standard designed to make joining a Wi-Fi router easier, especially in home settings. The device would have an 8 digit pin printed on the device, and the user could enter that pin to join the network. reaver is a tool to brute force WPS PIN associated with any AP

I run ifconfig to see available interfaces

For the first moment, I could say that mon0 interface for monitoring mode and other wlanX are the interfaces for Access points on the machine.

The next step is to get more info about these APs

We can conclude that mon0 is the interface that we will use for attacking the access points and wlan1 is the target access point as it's the only one that have ESSID: "OpenWrt" with SSID:02:00:00:00:00:00

I can now start reaver to brute force WPS PIN

As there is no path for me now to root, I will try to authenticate to root with the WPA PSK key obtained above:

Success :)

Last updated