githubEdit

Expressway

Box Info


OS
Difficulty

Linux

Easy

0x1 Nmap Scan


TCP Scan


nmap -sV -sC 10.10.11.87
Starting Nmap 7.95 ( https://nmap.org ) at 2025-09-21 18:35 EEST
Nmap scan report for 10.10.11.87
Host is up (0.32s latency).
Not shown: 999 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 10.0p2 Debian 8 (protocol 2.0)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

we try to scan all ports but just ssh is only open using TCP Scan

UDP Scan


we will notice port 500 is open which associated with the IKE (Internet Key Exchange) service. This protocol is the foundation of IPsec VPNs, used to negotiate secure tunnels. This is our attack surface.

0x2 IKE-Scan


ike-scan probes IKE (ISAKMP) services (typically UDP/500 or UDP/4500 with NAT-T) to discover VPN gateways and fingerprint them (Vendor ID/backoff). Key features:

circle-check

Aggressive Scan


Crack PSK


0x3 Initial foothold


We found something interest

  • CVE-2025-32462 → can privilege user to root permission using sudo -h

  • ike user is a member of proxy group

  • PATH → has a multiple sudo account which default sudo path is /usr/bin/sudo and machine sudo path /usr/local/bin/sudo and non default is the first in path

Finding One


that's meaning if we use localhostarrow-up-right with sudo -h we can get root permission

Finding Two


we are a member in proxy group so this group often has permissions related to proxy services like Squid

check first file

that’s refer client tried to access an internal-only host named offramp.expressway.htb through the proxy

Finding Three


we will use none default root path

0x4 Root


Last updated