HackTheBox - AirTouch

IppSec · Beginner ·🔐 Cybersecurity ·2h ago
00:00 - Introduction 00:50 - Start of nmap 02:15 - Playing with UDPx which is a fast udp scanner 05:00 - Running SNMPWalk and seeing the password is in the system description 07:00 - There were some pictures in the home directory, looking at them to see network diagrams 09:50 - Discovering airodump-ng is on the box. Looking at wireless networks, showing we could manually do this from iwlist aswell 14:40 - Showing Airodump by default only scanning 2.4ghz, changing the bands to include 5ghz channels to get more information 21:00 - Looking at authentication methods, seeing the Internet uses WPA P…
Watch on YouTube ↗ (saves to browser)

Related AI Lessons

Steel Mountain — TryHackMe Walkthrough
Learn to perform initial reconnaissance on a target machine using TryHackMe's Steel Mountain challenge
Medium · Cybersecurity
We Put Our Documentation Linter Under an AI-Driven Siege. Here’s the Post-Mortem
Learn how a controlled AI-driven security audit revealed vulnerabilities in a Markdown credential scanner and how to address them
Medium · Python
The Digital Fortress on Sand
Learn about digitisation adoption challenges and solutions in Pakistan's cybersecurity landscape and how to implement secure digital systems
Medium · Cybersecurity
SOC Raw Log Analysis: The Complete Field Manual Every Analyst Needs (L1 to L3)
Learn to read raw logs fluently to improve your defensive security skills and find potential threats in your system
Medium · Cybersecurity

Chapters (16)

Introduction
0:50 Start of nmap
2:15 Playing with UDPx which is a fast udp scanner
5:00 Running SNMPWalk and seeing the password is in the system description
7:00 There were some pictures in the home directory, looking at them to see network
9:50 Discovering airodump-ng is on the box. Looking at wireless networks, showing w
14:40 Showing Airodump by default only scanning 2.4ghz, changing the bands to includ
21:00 Looking at authentication methods, seeing the Internet uses WPA PSK which is c
25:50 Adding the WPA PSK into wireshark so it decrypts for me, grabbing cookies from
27:30 Joining the Airtouch-Internet wifi network then accessing the web portal
34:00 Uploading a PHP Script with phtml extension to get RCE
38:50 Testing networks by manually adding routes to see if any can talk to 10.10.10.
41:00 Finding SSL Certificates, copying them to the initial box so we can run EapHam
44:30 Running eaphammer than performing the deauth attack on both office access poin
48:20 Connecting to the Office Network then discovering more credentials in hostapd
51:30 Switching to admin which can su to root
Up next
Dasar-Dasar Dukungan Teknis
Coursera
Watch →