βœ…Mirai (Easy)

Lesson Learn

Report-Penetration

Vulnerable Exploit: Default Credential

System Vulnerable: 10.10.10.48

Vulnerability Explanation: By intercept traffic in burp, it shows the application name with admin URL path. By perform OSINT, we found the default credential and it's in used on the system.

Privilege Escalation Vulnerability: Misconfigure of Privilege User

Vulnerability Fix: Make sure there is no default credentials in used and least privilege for user.

Severity: High

Step to Compromise the Host:

Reconnaissance

Enumeration

Port 80 Lighttpd 1.4.35

It just displays a blank page. Intercept through burp proxy

change host to machine name for testing. We found domain pi.hole

Access pi.hole on the browser, it doesn't redirect to anywhere.

In burp, it redirects to /admin/

Notice that it's running on pi version 3.1.4.

Exploitation

Privilege Escalation

Post Exploitation

Last updated