WifineticTwo

Recon

nmap_scan.log

HTTP (8080)

OpenPLC

Writeup.png

We have no users so we can't exactly go somewhere.. Using default credentialsarrow-up-right: openplc:openplc we are able to login!

OpenPLC creds: openplc:openplc

Authenticated RCE

CVE-2021-31630arrow-up-rightOpenPLC WebServer v3 - Authenticated RCEarrow-up-right

Reverse Shell

We are root, which is odd... something isn't right.

User.txt

root user contains user.txt meaning this root user is not the one we need.

Privilege Escalation

Just like the box name suggests we are dealing with a WiFi. Check network interfaces:

We have Wi-Fi related command to utilize, such as iwarrow-up-right - show / manipulate wireless devices and their configuration

WPS is supported meaning it could be bruteforced.

Pixie Dust Attack

OneShotarrow-up-right performs Pixie Dust attackarrow-up-right without having to switch to monitor mode.

Note: Python version of attack is used as it's much simpler then compiling C

Connect to plcrouter

Generate config file for connection and then use generated config to connect to router.

Use dhclient to get an IP and using arp check network ip.

Root.txt

Last updated