Photon Lockdown

Description

We've located the adversary's location and must now secure access to their Optical Network Terminal to disable their internet connection. Fortunately, we've obtained a copy of the device's firmware, which is suspected to contain hardcoded credentials. Can you extract the password from it?

Solution

In the given zip file we find SquashFS which is mountable readonly mountable image

Note: Understanding SquashFS and How to Mount a SquashFS Filesystemarrow-up-right

└─$ tree
.
├── ONT
│   ├── fwu_ver
│   ├── hw_ver
│   └── rootfs
├── Photon Lockdown.zip
└── zip_password # hackthebox

└─$ cat fwu_ver
3.0.5

└─$ cat hw_ver
X1

└─$ file rootfs
rootfs: Squashfs filesystem, little endian, version 4.0, zlib compressed, 10936182 bytes, 910 inodes, blocksize: 131072 bytes, created: Sun Oct  1 07:02:43 2023

Mount the device on desired location

Home directory had nothing, just hidden directory with keep going text note.

After doing a global search we can find the "password":

Dont forget to unmount the device!

Last updated