HTB - Sense

Sense

Getting Root

  1. Found a username named rohit under a text file we found using gobuster

  2. Used the default password pfsense and logged in to the admin panel

  3. From the admin panel we noticed the version was 2.1.3 and exploit-db had a python exploit which got us root access

Tools Used:

nmap, gobuster, searchsploit

Nmap

Enumeration

Gobuster

Checking /changelog.txt

Checking /system-users.txt

We got username: rohit and a simple google search on pfsense default username and password shows that the default password is pfsense

We can successfully login and notice that the pfsense version is 2.1.3

Using searchsploit we find exploits/php/webapps/43560.py

Privilege Escalation

Running the exploit

We get a shell as root

Last updated