Page cover

🧠Real-World Security Lessons from HTB’s Postman: Misconfig to Root📮

💡 Summary

Postman (Linux, Easy) brings together two beautiful classics: an unauthenticated Redis server and a Webmin 1.910 instance vulnerable to command injection. Add a dash of SSH key juggling, and we’ve got a shell delivery system.

🔍 Enumeration

⚙️ Full Port Scan

Open Ports

  • 22 – SSH

  • 80 – Apache 2.4.29

  • 6379 – Redis 4.0.9 (no auth)

  • 10000 – MiniServ 1.910 (Webmin)

🧠 Service Enumeration

Discovered:

  • Webmin running on MiniServ 1.910

  • Redis unauthenticated

  • SSH banner suggests Ubuntu

  • Apache server hosting a personal website

🔎 Googled the following:

🛠️ Exploitation: Redis to Shell

Generate SSH Key

Check for writable .ssh directory in Redis

Inject Public Key

Login via SSH as redis

🚪 Lateral Movement

Found id_rsa.bak in /opt:

🎯 Password Cracked: computer2008

  • i tried to ssh into the box but i was not able to as Matt

    • so changed user using the redis shell

📈 Privilege Escalation – Webmin RCE

  • When i try to login into web admin panel with Matt Creds i can get in

  • metasploit has a module for exploit webadmin

  • webadmin is running as root and hence after exploiting it get a shell as root

🧠 Key Learnings from HTB Postman

  1. Default Redis Misconfiguration Can Lead to Shell Access Misconfigured Redis instances without authentication allow attackers to write files like authorized_keys, leading to direct system access.

  2. Exposed Private Keys Are a Critical Risk Backup or misplaced private keys (.bak files) can be cracked and reused for lateral movement. Regular key audits and encryption hygiene are essential.

  3. Outdated Web Interfaces Like Webmin Pose Privilege Escalation Risks Webmin v1.910 contains a known RCE vulnerability, allowing remote root access via command injection. Patch management is non-negotiable.

  4. Credential Reuse Enables Account Traversal Reusing passwords across services (e.g., Redis to Webmin) facilitated lateral movement and elevation of privileges.

  5. Misconfigurations Chain into Full Compromise No single point of failure — rather, a chain of small missteps (open Redis, leaked key, outdated Webmin) led to complete root compromise.

Last updated