Hack The Box: UnderPass
A medium-difficulty penetration test involving multi-protocol enumeration, credential discovery through exposed services, password cracking, and privilege escalation via a misconfigured sudo binary.
A medium-difficulty penetration test involving multi-protocol enumeration, credential discovery through exposed services, password cracking, and privilege escalation via a misconfigured sudo binary.
The UnderPass machine required chaining multiple enumeration techniques across TCP, UDP, and web services to uncover hidden attack paths.
Unlike simpler labs, this challenge emphasized situational awareness and the ability to pivot when initial access attempts failed, reinforcing real-world pentesting methodology.
I began with full TCP and targeted UDP scans to build a complete picture of exposed services instead of relying on TCP enumeration alone.
When traditional web login attempts failed, I expanded the scope to include SNMP and directory brute forcing to uncover less obvious entry points.
I treated every discovered service as a potential information leak rather than assuming it required direct exploitation.
Performed full TCP and top-100 UDP scans to identify SSH, HTTP, and SNMP services
Enumerated SNMP to extract system metadata and identify references to daloRADIUS
Brute-forced web directories to locate hidden application paths and multiple login portals
Authenticated to the daloRADIUS operators interface using default credentials
Extracted a hashed password for the svcMosh service account
Cracked the MD5 hash using Hashcat and a large password wordlist
Logged in via SSH with recovered credentials and obtained user-level access
Enumerated sudo privileges to identify a misconfigured mosh-server binary
This machine demonstrated how exposed management interfaces with default credentials can lead to full system compromise.
The use of MD5 hashing without salting highlighted the dangers of weak password storage practices.
Allowing passwordless sudo access to a network utility introduced a critical privilege escalation path.
The challenge reinforced the importance of service hardening, credential hygiene, and strict sudo policy enforcement.
Achieved initial access by chaining SNMP enumeration, credential reuse, and password cracking.
Escalated privileges to root by abusing a misconfigured sudo rule for mosh-server.
Captured both user and root flags successfully.
Gained deeper experience in multi-stage attack chains that combine enumeration, cryptanalysis, and local privilege escalation.
This project is fully documented on GitHub, including notes, commits, and future ideas.