Page cover

🕵️HTB: OpenAdmin – RCE, Privilege Escalation, and the Art of Improvisation

🔍 Enumeration Phase

We begin the usual way—recon with nmap.

Open ports:

  • 22 (SSH)

  • 80 (HTTP)

Port 80 means web enumeration. Time to let ffuf loose:

Interesting hits:

  • /music/

  • /sierra/

  • /artwork/

Crawling with hakrawler through Burp gave a promising path:

Bingo. This is OpenNetAdmin, and version 18.1.1 specifically.

💥 Initial Foothold: RCE via OpenNetAdmin

Quick search on ExploitDB brings up an RCE:

With a little Burp Proxy magic, we got a working shell. Though unstable, it did the job.

🧠 Privilege Escalation Begins

Time for lateral movement. Classic reverse shell:

📦 Credential Harvesting

A quick loot run on config files reveals gold:

🔐 SSH Brute-force and User Access

Grabbed usernames from /etc/passwd:

Brute-forced via Hydra:

🎯 Hit confirmed: jimmy : n1nj4W4rri0R!

🕵️ Discovery and Key Recovery

Exploring /var/www/internal (finally accessible as jimmy), we find something new. The page isn’t accessible over HTTP, but we can curl it locally:

And boom—we find an SSH private key.

But it's encrypted. Time for john magic:

⚡ Privilege Escalation to Root

We check what joanna can run:

Allowed to run:

We abuse it using a classic nano GTFOBins technique:

Inside nano:

for a shell

Last updated