🧠Real-World Security Lessons from HTB’s Postman: Misconfig to Root📮

💡 Summary
Postman (Linux, Easy) brings together two beautiful classics: an unauthenticated Redis server and a Webmin 1.910 instance vulnerable to command injection. Add a dash of SSH key juggling, and we’ve got a shell delivery system.
🔍 Enumeration
⚙️ Full Port Scan
Open Ports
22 – SSH
80 – Apache 2.4.29
6379 – Redis 4.0.9 (no auth)
10000 – MiniServ 1.910 (Webmin)
🧠 Service Enumeration
Discovered:
Webmin running on MiniServ 1.910
Redis unauthenticated
SSH banner suggests Ubuntu
Apache server hosting a personal website
🔎 Googled the following:
Redis 4.0.9 RCE possibilities
Webmin 1.910 exploit Exploit-DB 46984
🛠️ Exploitation: Redis to Shell
Generate SSH Key
Check for writable .ssh directory in Redis
Inject Public Key
Login via SSH as redis
🚪 Lateral Movement
Found id_rsa.bak in /opt:
🎯 Password Cracked: computer2008
i tried to ssh into the box but i was not able to as Matt
so changed user using the redis shell
📈 Privilege Escalation – Webmin RCE

When i try to login into web admin panel with Matt Creds i can get in
metasploit has a module for exploit webadmin
webadmin is running as root and hence after exploiting it get a shell as root
🧠 Key Learnings from HTB Postman
Default Redis Misconfiguration Can Lead to Shell Access Misconfigured Redis instances without authentication allow attackers to write files like
authorized_keys, leading to direct system access.Exposed Private Keys Are a Critical Risk Backup or misplaced private keys (
.bakfiles) can be cracked and reused for lateral movement. Regular key audits and encryption hygiene are essential.Outdated Web Interfaces Like Webmin Pose Privilege Escalation Risks Webmin v1.910 contains a known RCE vulnerability, allowing remote root access via command injection. Patch management is non-negotiable.
Credential Reuse Enables Account Traversal Reusing passwords across services (e.g., Redis to Webmin) facilitated lateral movement and elevation of privileges.
Misconfigurations Chain into Full Compromise No single point of failure — rather, a chain of small missteps (open Redis, leaked key, outdated Webmin) led to complete root compromise.
Last updated

