Photon Lockdown
We've located the adversary's location and must now secure access to their Optical Network Terminal to disable their internet connection. Fortunately, we've obtained a copy of the device's firmware, which is suspected to contain hardcoded credentials. Can you extract the password from it?
Photon Lockdown
Data Leak Exploitation
Se extraen los archivos del firmware.
1
2
3
4
/home/kali/Documents/htb/challenges/photonlockdown:-$ unzip photon_lockdown.zip
fwu_ver
hw_ver
rootfs
El archivo rootfs es identificado como un sistema de archivos SquashFS.
1
2
/home/kali/Documents/htb/challenges/photonlockdown:-$ file rootfs
rootfs: Squashfs filesystem, little endian, version 4.0, zlib compressed, 10936182 bytes, 910 inodes, blocksize: 131072 bytes, created: Sun Oct 1 07:02:43 2023
Descomprimo el sistema de archivos. Y busco cualquier referencia a “HTB” dentro.
1
2
3
4
5
6
/home/kali/Documents/htb/challenges/photonlockdown:-$ sudo unsquashfs -d root rootfs
/home/kali/Documents/htb/challenges/photonlockdown/root:-$ grep -rl 'HTB'
bin/ip
bin/tc
etc/config_default.xml
Por ultimo, encuentro la flag dentro del archivo config_default.xml
.
1
2
/home/kali/Documents/htb/challenges/photonlockdown:-$ grep -i 'HTB' etc/config_default.xml
< Value Name="SUSER_PASSWORD" Value="HTB{N0w_Y0u_C4n_L0g1n}"/>
This post is licensed under CC BY 4.0 by the author.