Raspap
Exploiting Raspap - chaining attacks
Chaining exploits is possible to go from zero to root π
Initial foothold
Credentials
Default
Username - "admin"
Password - "secret"
Hash
Found in the raspap.auth file
Can be cracked with hashcat:
Console access may be possible
If authorized, it may be possible to access the web console /includes/webconsole.php
Exploits
CVE-2020-24572
Getting a shell π
Priv Esc
Run sudo -l to see what you can work with. There is a good chance scripts or services can be manipulated to grant root access.

Practice boxes
Proving grounds - Walla
Last updated