Default credentials we’ll be used on this machine to access it.
Add the IP address in /etc/hosts
:
...
10.10.10.48 mirai.htb
...
A lot of ports are open contrary to the other easy boxes.
It tells us that the machine is a Pi-hole version 3.1.4
. We cannot access the website because our IP is not whitelisted. To add it we must know the password but it cannot be cracked.
A fuzzing show us that there is an admin panel at http://mirai.htb/admin
:
We can try to login but we don’t know the password. There are other versions on the bottom right but can’t exploit them.
On port 53
we can try a transfer zone on the DNS to see if there are relevant results but nothing happens.
On port 32400
, there is a Plex server:
Plex is a streaming media service. Maybe we can retrieve the version and exploit something.
We don’t know any credentials but there is a sign up button to create a new account.
Once the account created, on the website, we find a version but there is nothing to do with it.
Try to login to the previous admin panel we found but no result.
The default login for pi-hole devices is pi:raspberry
. As the machine is a Raspberry Pi, what if it has default credentials for the SSH?
Bingo, we can retrieve the user flag.
As we are on a Raspberry Pi device, we can directly jump to root:
But trying to access the root flag:
Apparently the real flag is somewhere on a USB stick. Mounted devices are generally located under /mnt/
or /media/
for temporary devices such as external hard drives or USB sticks:
We found the new file but it tells us that the file containing the flag has been deleted.
The command mount
allows us to list mounted partitions:
And there is our USB stick.
Looking deeper in the partition:
We’ve found the final flag!