Raspap

Exploiting Raspap - chaining attacks

Chaining exploits is possible to go from zero to root πŸš€

Initial foothold

Credentials

Default

Username - "admin"

Password - "secret"

Hash

Found in the raspap.auth file

Can be cracked with hashcat:

Console access may be possible

If authorized, it may be possible to access the web console /includes/webconsole.php

Exploits

CVE-2020-24572

Getting a shell πŸ˜„

Priv Esc

Run sudo -l to see what you can work with. There is a good chance scripts or services can be manipulated to grant root access.

Practice boxes

Proving grounds - Walla

Last updated