β Mirai (Easy)
Lesson Learn
Report-Penetration
Vulnerable Exploit: Default Credential
System Vulnerable: 10.10.10.48
Vulnerability Explanation: By intercept traffic in burp, it shows the application name with admin URL path. By perform OSINT, we found the default credential and it's in used on the system.
Privilege Escalation Vulnerability: Misconfigure of Privilege User
Vulnerability Fix: Make sure there is no default credentials in used and least privilege for user.
Severity: High
Step to Compromise the Host:
Reconnaissance
Enumeration
Port 80 Lighttpd 1.4.35
It just displays a blank page. Intercept through burp proxy

change host to machine name for testing. We found domain pi.hole

Access pi.hole on the browser, it doesn't redirect to anywhere.

In burp, it redirects to /admin/


Notice that it's running on pi version 3.1.4.

Exploitation
Privilege Escalation
Post Exploitation
Last updated