{"id":515,"date":"2025-01-26T03:25:48","date_gmt":"2025-01-26T03:25:48","guid":{"rendered":"https:\/\/infosecjake.net\/?p=515"},"modified":"2025-05-28T01:32:35","modified_gmt":"2025-05-28T01:32:35","slug":"hackthebox-underpass-walkthrough","status":"publish","type":"post","link":"https:\/\/infosecjake.net\/?p=515","title":{"rendered":"HackTheBox &#8211; UnderPass Walkthrough"},"content":{"rendered":"\n<p>It&#8217;s been a bit since I&#8217;ve posted any walkthroughs, so here we are back with an easy machine called UnderPass.<\/p>\n\n\n\n<p>I use my own Kali VM to attack from and connect through VPN to the HTB network. You can do that or use one of their attack boxes. I prefer my own as I have a lot of notes, exploits, and other files saved on my personal Kali VM instance.<\/p>\n\n\n\n<p>After booting up my Kali VM and connecting to VPN, we&#8217;ll boot up the UnderPass machine and start scanning.<\/p>\n\n\n\n<p>As is standard, we&#8217;ll get an nmap scan fired off to see what network ports are open on the machine. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"193\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image.png\" alt=\"Initial nmap scan\" class=\"wp-image-516\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-300x59.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-768x152.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>Our initial nmap scan shows a webservice on port 80 and ssh open on port 22.<\/p>\n\n\n\n<p>We&#8217;ll add overpass.htb to our \/etc\/hosts\/ file for easy name resolution.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"553\" height=\"300\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-1.png\" alt=\"modifying hosts file\" class=\"wp-image-517\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-1.png 553w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-1-300x163.png 300w\" sizes=\"auto, (max-width: 553px) 100vw, 553px\" \/><\/figure>\n\n\n\n<p>Now, navigating to the website we can see there&#8217;s a default apache page.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"266\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-3.png\" alt=\"Default apache\" class=\"wp-image-519\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-3.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-3-300x82.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-3-768x210.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>Nothing to see there, so let&#8217;s do some directory fuzzing with ffuf. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"713\" height=\"41\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-6.png\" alt=\"ffuf\" class=\"wp-image-522\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-6.png 713w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-6-300x17.png 300w\" sizes=\"auto, (max-width: 713px) 100vw, 713px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"742\" height=\"216\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-5.png\" alt=\"results\" class=\"wp-image-521\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-5.png 742w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-5-300x87.png 300w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\" \/><\/figure>\n\n\n\n<p>None of these are accessible, giving me a forbidden message. So, let&#8217;s take a step back and do a different type of nmap scan. Our initial scan was using tcp, but maybe there&#8217;s something else we&#8217;re not seeing using UDP. We&#8217;ll use the -sU flag and limit it to the top 100 ports.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"297\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-7.png\" alt=\"UDP scan\" class=\"wp-image-523\" style=\"width:643px;height:auto\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-7.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-7-300x91.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-7-768x234.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>We can now see there&#8217;s an snmp port open as well as radius.<\/p>\n\n\n\n<p>So, let&#8217;s enumerate the snmp service to see what we can find.<\/p>\n\n\n\n<p>First, we&#8217;ll use snmp-check with the -c Public option.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"964\" height=\"269\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-8.png\" alt=\"oof\" class=\"wp-image-524\" style=\"width:699px;height:auto\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-8.png 964w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-8-300x84.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-8-768x214.png 768w\" sizes=\"auto, (max-width: 964px) 100vw, 964px\" \/><\/figure>\n\n\n\n<p>Oof, it would work correctly if I used correct capitalization. Quick review of the Kali doc <a href=\"https:\/\/www.kali.org\/tools\/snmpcheck\/\" target=\"_blank\" rel=\"noopener\" title=\"\">here<\/a> shows that &#8216;public&#8217; should be lowercase. Let&#8217;s try that again.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"355\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-9.png\" alt=\"snmp check results\" class=\"wp-image-525\" style=\"width:709px;height:auto\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-9.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-9-300x109.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-9-768x280.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>Not a ton of information but I do see a user, maybe we can use that later? I&#8217;ll keep that noted just in case. Additionally, the hostname output says that this is the only daloradius server in the basin. I have no idea what that means, but let&#8217;s do some Googling on it.<\/p>\n\n\n\n<p>In the meanwhile, we&#8217;ll use snmpwalk to see if there&#8217;s anything additional that snmp-check missed.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"919\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-10.png\" alt=\"snmpwalk results\" class=\"wp-image-526\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-10.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-10-300x283.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-10-768x724.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>I spent a bit of time doing some Google searching on Daloradius. I was able to find <a href=\"https:\/\/www.techrepublic.com\/article\/how-to-install-the-daloradius-web-based-interface-for-freeradius\/\" target=\"_blank\" rel=\"noopener\" title=\"this\">this<\/a> article on installing Daloradius that shows the default web path to the service as well as what appears to be default credentials. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"853\" height=\"388\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-11.png\" alt=\"Daloradius directory\" class=\"wp-image-527\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-11.png 853w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-11-300x136.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-11-768x349.png 768w\" sizes=\"auto, (max-width: 853px) 100vw, 853px\" \/><\/figure>\n\n\n\n<p>Trying to visit this directory results in a forbidden message. So, we know the endpoint appears to be there&#8230;.somewhere&#8230;hiding. Let&#8217;s see if we can find it with ffuf. Using ffuf, I just fed it the option of underpass.htb\/daloradius\/FUZZ. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"462\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-12.png\" alt=\"more ffuf\" class=\"wp-image-528\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-12.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-12-300x142.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-12-768x364.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>We will keep iterating and through these subfolders til we find what we&#8217;re looking for. So far we know there&#8217;s \/daloradius\/app\/. Next, we find users and navigate to that on the browser. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"442\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-13.png\" alt=\"\" class=\"wp-image-529\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-13.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-13-300x136.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-13-768x348.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>It directs us to the users login endpoint. Let&#8217;s see if we can use the default credentials for this. I used the creds from the install guide above but that did not work.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"224\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-14.png\" alt=\"daloradius default creds\" class=\"wp-image-530\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-14.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-14-300x69.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-14-768x176.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>Quick Google search gave me these creds. However, these still do not work.<\/p>\n\n\n\n<p>Ok, when in doubt, enumerate out. Let&#8217;s do some more searching, this time with dirsearch. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"67\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-15-1024x67.png\" alt=\"dirsearch\" class=\"wp-image-531\" style=\"width:857px;height:auto\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-15-1024x67.png 1024w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-15-300x20.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-15-768x50.png 768w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-15.png 1102w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"78\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-16-1024x78.png\" alt=\"dirsearch results\" class=\"wp-image-532\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-16-1024x78.png 1024w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-16-300x23.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-16-768x58.png 768w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-16.png 1066w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>We found that there&#8217;s another endpoint. This one called operators. Ffuf did not find this endpoint, likely due to the wordlist I used, which is a bit of a bummer. However, I&#8217;ve often found that using different tools &amp; wordlists does seem to help if you get stuck.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"650\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-17.png\" alt=\"operators login\" class=\"wp-image-533\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-17.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-17-300x200.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-17-768x512.png 768w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-17-507x338.png 507w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>Same login page but \/operators\/ endpoint instead of \/users\/. Let&#8217;s try those default credentials again.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"327\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-18.png\" alt=\"daloradius page\" class=\"wp-image-534\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-18.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-18-300x101.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-18-768x258.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>We are in!<\/p>\n\n\n\n<p>Here, I spent a little time browsing the site and taking note of anything interesting. In the config section there is a Database Settings menu that has a username and password for their MySQLi database. I&#8217;ll note that for future use, if needed.<\/p>\n\n\n\n<p>Additionally, I noticed there is 1 user listed on the main page. Clicking on the user list shows us what appears to be a hashed password for that user.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"172\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-19.png\" alt=\"user hash\" class=\"wp-image-535\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-19.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-19-300x53.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-19-768x135.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>We can take that hash and convert it to see what the password is.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"433\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-20.png\" alt=\"md5 hash\" class=\"wp-image-536\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-20.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-20-300x133.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-20-768x341.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>Now that we have the password, let&#8217;s try using this account &amp; password on the ssh service.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"707\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-22.png\" alt=\"ssh login\" class=\"wp-image-538\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-22.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-22-300x218.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-22-768x557.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>We now have user access to the box and the user flag is sitting in our current directory.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"636\" height=\"145\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-23.png\" alt=\"\" class=\"wp-image-539\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-23.png 636w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-23-300x68.png 300w\" sizes=\"auto, (max-width: 636px) 100vw, 636px\" \/><\/figure>\n\n\n\n<p>User flag has been captured. Now, let&#8217;s work on privilege escalation to get the root flag.<\/p>\n\n\n\n<p>We&#8217;ll use our trusty linpeas script. Linpeas stands for linux privilege escalation awesome tool, if I remember correctly. It&#8217;s a super useful tool to scan the system and look for possible ways to gain root access. There is also a windows version called winpeas.<\/p>\n\n\n\n<p>I will host the linpeas from a local folder on my attack machine via a python simple http server and then from the victim machine I will use curl to grab and run the script.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"141\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-24.png\" alt=\"hosting the simple server\" class=\"wp-image-540\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-24.png 900w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-24-300x47.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-24-768x120.png 768w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/figure>\n\n\n\n<p>Above I&#8217;m running a simple http server and you can see the incoming GET request for linpeas.sh.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"293\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-25.png\" alt=\"curling linpeas\" class=\"wp-image-541\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-25.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-25-300x90.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-25-768x231.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>Here, you can see the curl request to my attack box for the linpeas script and then running it.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"156\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-26.png\" alt=\"svcMosh\" class=\"wp-image-542\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-26.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-26-300x48.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-26-768x123.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>After a bit of running we can see the output of a simple &#8216;sudo -L&#8217; command. svcMosh account can run \/usr\/bin\/mosh-server with root privileges.<\/p>\n\n\n\n<p>Do I know what mosh-server is? Nope! After a bit of Google searching on what mosh-server is and how to do privilege escalation with it, I found <a href=\"https:\/\/medium.com\/@momo334678\/mosh-server-sudo-privilege-escalation-82ef833bb246\" target=\"_blank\" rel=\"noopener\" title=\"\">this Medium article<\/a> super handy. By the way, did I mention how much time I spend Googling during these machines? There&#8217;s so many different tools, software, and exploits out there that Google becomes super useful.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"292\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-27.png\" alt=\"runing mosh server and escalation\" class=\"wp-image-543\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-27.png 975w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-27-300x90.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-27-768x230.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p>Above, we run the mosh server and then following the article, we take the key and connect with the mosh client locally. This brings us directly in as a root user. Just as a side note, this took me SEVERAL tries to do. For some reason when I was copying the key after starting the mosh server it was not connecting. I&#8217;m not sure if it was how I was pasting or if I was accidentally copying a space. So, if it doesn&#8217;t work the first time, be very careful how you copy\/paste.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"891\" height=\"808\" src=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-28.png\" alt=\"root access\" class=\"wp-image-544\" srcset=\"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-28.png 891w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-28-300x272.png 300w, https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/image-28-768x696.png 768w\" sizes=\"auto, (max-width: 891px) 100vw, 891px\" \/><\/figure>\n\n\n\n<p>Now that I have root, we can simply grab the root flag and finish this machine.<\/p>\n\n\n\n<p>This was a pretty interesting one! I&#8217;ve not messed with mosh server before or the daloradius. So these are two new services to me that I had a blast exploiting. I hope you enjoyed the walkthrough and I&#8217;ll see you again on the next one!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s been a bit since I&#8217;ve posted any walkthroughs, so here we are back with an easy machine called UnderPass.<\/p>\n<p><a href=\"https:\/\/infosecjake.net\/?p=515\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\">HackTheBox &#8211; UnderPass Walkthrough<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":545,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[31],"tags":[33,42,34],"class_list":["post-515","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ctf-challenge-walkthroughs","tag-ctf","tag-hackthebox","tag-walkthrough"],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/infosecjake.net\/wp-content\/uploads\/2025\/01\/underpass.png","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/infosecjake.net\/index.php?rest_route=\/wp\/v2\/posts\/515","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosecjake.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infosecjake.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infosecjake.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosecjake.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=515"}],"version-history":[{"count":1,"href":"https:\/\/infosecjake.net\/index.php?rest_route=\/wp\/v2\/posts\/515\/revisions"}],"predecessor-version":[{"id":546,"href":"https:\/\/infosecjake.net\/index.php?rest_route=\/wp\/v2\/posts\/515\/revisions\/546"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosecjake.net\/index.php?rest_route=\/wp\/v2\/media\/545"}],"wp:attachment":[{"href":"https:\/\/infosecjake.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=515"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infosecjake.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=515"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infosecjake.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}