🕵️HTB: OpenAdmin – RCE, Privilege Escalation, and the Art of Improvisation

🔍 Enumeration Phase
We begin the usual way—recon with nmap.
Open ports:
22 (SSH)
80 (HTTP)
Port 80 means web enumeration. Time to let ffuf loose:

Interesting hits:
/music//sierra//artwork/
Crawling with hakrawler through Burp gave a promising path:
Bingo. This is OpenNetAdmin, and version 18.1.1 specifically.
💥 Initial Foothold: RCE via OpenNetAdmin
Quick search on ExploitDB brings up an RCE:
With a little Burp Proxy magic, we got a working shell. Though unstable, it did the job.
🧠 Privilege Escalation Begins
Time for lateral movement. Classic reverse shell:
📦 Credential Harvesting
A quick loot run on config files reveals gold:
🔐 SSH Brute-force and User Access
Grabbed usernames from /etc/passwd:
Brute-forced via Hydra:
🎯 Hit confirmed: jimmy : n1nj4W4rri0R!
🕵️ Discovery and Key Recovery
Exploring /var/www/internal (finally accessible as jimmy), we find something new. The page isn’t accessible over HTTP, but we can curl it locally:

And boom—we find an SSH private key.
But it's encrypted. Time for john magic:
⚡ Privilege Escalation to Root
We check what joanna can run:
Allowed to run:
We abuse it using a classic nano GTFOBins technique:
Inside nano:

for a shell
Last updated
