HackTheBox - WifineticTwo
Skills:
Network Security90%
00:00 - Intro
01:00 - Start of nmap
02:54 - Discovering OpenPLC, looking for default credentials and logging in with openplc:openplc
05:10 - Uploading a C reverse shell to OpenPLC
08:20 - Talking about our shell hanging our webserver, showing a POC that runs system() to background a process which seems to be smart
09:55 - Discovering a Wireless NIC, running IW to see wireless networks and OneShot to attack WPS
12:30 - Joining the Wireless Network, showing how important it is to tell DHCLIENT to not update default routes
16:55 - Cheating to get a root shell, so we can show the routing table of the container that can no longer talk to us
19:20 - Adding unset new_routers to a DHCLIENT Enter Hook so it doesn't update routes
21:10 - Once we get on the Wireless Network we can SSH to OpenWRT and get the root flag
21:45 - Showing we could exploit OpenWRT through the web interface aswell, setting up a pivot with Chisel
23:20 - Logging into OpenWRT with a blank password, going to the Scheduled Tasks to create a cron
27:10 - Creating a Reverse Shell Payload with MSFVenom
29:20 - Getting multiple reverse shells so we can easily run multiple commands on the container
Watch on YouTube ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
Playlist
Uploads from IppSec · IppSec · 0 of 60
← Previous
Next →
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
HHC2016 - Analytics
IppSec
HackTheBox - October
IppSec
HackTheBox - Arctic
IppSec
HackTheBox - Brainfuck
IppSec
HackTheBox - Bank
IppSec
HackTheBox - Joker
IppSec
HackTheBox - Lazy
IppSec
Camp CTF 2015 - Bitterman
IppSec
HackTheBox - Devel
IppSec
Reversing Malicious Office Document (Macro) Emotet(?)
IppSec
HackTheBox - Granny and Grandpa
IppSec
HackTheBox - Pivoting Update: Granny and Grandpa
IppSec
HackTheBox - Optimum
IppSec
HackTheBox - Charon
IppSec
HackTheBox - Sneaky
IppSec
HackTheBox - Holiday
IppSec
HackTheBox - Europa
IppSec
Introduction to tmux
IppSec
HackTheBox - Blocky
IppSec
HackTheBox - Nineveh
IppSec
HackTheBox - Jail
IppSec
HackTheBox - Blue
IppSec
HackTheBox - Calamity
IppSec
HackTheBox - Shrek
IppSec
HackTheBox - Mirai
IppSec
HackTheBox - Shocker
IppSec
HackTheBox - Mantis
IppSec
HackTheBox - Node
IppSec
HackTheBox - Kotarak
IppSec
HackTheBox - Enterprise
IppSec
HackTheBox - Sense
IppSec
HackTheBox - Minion
IppSec
VulnHub - Sokar
IppSec
VulnHub - Pinkys Palace v2
IppSec
HackTheBox - Inception
IppSec
Vulnhub - Trollcave 1.2
IppSec
HackTheBox - Ariekei
IppSec
HackTheBox - Flux Capacitor
IppSec
HackTheBox - Jeeves
IppSec
HackTheBox - Tally
IppSec
HackTheBox - CrimeStoppers
IppSec
HackTheBox - Fulcrum
IppSec
HackTheBox - Chatterbox
IppSec
HackTheBox - Falafel
IppSec
How To Create Empire Modules
IppSec
HackTheBox - Nightmare
IppSec
HackTheBox - Nightmarev2 - Speed Run/Unintended Solutions
IppSec
HackTheBox - Bart
IppSec
HackTheBox - Aragog
IppSec
HackTheBox - Valentine
IppSec
HackTheBox - Silo
IppSec
HackTheBox - Rabbit
IppSec
HackTheBox - Celestial
IppSec
HackTheBox - Stratosphere
IppSec
HackTheBox - Poison
IppSec
HackTheBox - Canape
IppSec
HackTheBox - Olympus
IppSec
HackTheBox - Sunday
IppSec
HackTheBox - Fighter
IppSec
HackTheBox - Bounty
IppSec
More on: Network Security
View skill →Related AI Lessons
⚡
⚡
⚡
⚡
SpaceX–Cursor: The Layer You Don’t Control Owns Your Future in AI
Dev.to AI
From Rainforests to Recycling Plants: 5 Ways NVIDIA AI Is Protecting the Planet
NVIDIA AI Blog
Big Tech firms are accelerating AI investments and integration, while regulators and companies focus on safety and responsible adoption.
Dev.to AI
AI Layoffs Are Building a Prisoner’s Dilemma That Could Collapse the Global Economy
Medium · AI
Chapters (14)
Intro
1:00
Start of nmap
2:54
Discovering OpenPLC, looking for default credentials and logging in with openp
5:10
Uploading a C reverse shell to OpenPLC
8:20
Talking about our shell hanging our webserver, showing a POC that runs system(
9:55
Discovering a Wireless NIC, running IW to see wireless networks and OneShot to
12:30
Joining the Wireless Network, showing how important it is to tell DHCLIENT to
16:55
Cheating to get a root shell, so we can show the routing table of the containe
19:20
Adding unset new_routers to a DHCLIENT Enter Hook so it doesn't update routes
21:10
Once we get on the Wireless Network we can SSH to OpenWRT and get the root fla
21:45
Showing we could exploit OpenWRT through the web interface aswell, setting up
23:20
Logging into OpenWRT with a blank password, going to the Scheduled Tasks to cr
27:10
Creating a Reverse Shell Payload with MSFVenom
29:20
Getting multiple reverse shells so we can easily run multiple commands on the
🎓
Tutor Explanation
DeepCamp AI