1 minute read

Keeper

Reconnaissance

IP: 10.10.11.227

NMAP

nmap -T4 -p- -A 10.10.11.227
Starting Nmap 7.95 ( https://nmap.org ) at 2025-08-27 14:13 UTC
Nmap scan report for 10.10.11.227
Host is up (0.030s latency).
Not shown: 65533 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.9p1 Ubuntu 3ubuntu0.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   256 35:39:d4:39:40:4b:1f:61:86:dd:7c:37:bb:4b:98:9e (ECDSA)
|_  256 1a:e9:72:be:8b:b1:05:d5:ef:fe:dd:80:d8:ef:c0:66 (ED25519)
80/tcp open  http    nginx 1.18.0 (Ubuntu)
|_http-title: Site doesn't have a title (text/html).
|_http-server-header: nginx/1.18.0 (Ubuntu)
Device type: general purpose|router
Running: Linux 5.X, MikroTik RouterOS 7.X
OS CPE: cpe:/o:linux:linux_kernel:5 cpe:/o:mikrotik:routeros:7 cpe:/o:linux:linux_kernel:5.6.3
OS details: Linux 5.0 - 5.14, MikroTik RouterOS 7.2 - 7.5 (Linux 5.6.3)
Network Distance: 2 hops
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE (using port 199/tcp)
HOP RTT      ADDRESS
1   29.69 ms 10.10.14.1
2   30.14 ms 10.10.11.227

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 26.22 seconds

Only 2 open ports so starting with http

Website

Site

redirecting (we need to add /etc/hosts) Tried common combinations but without results

searching google for default credentials I found root:password which works.

in /Admin/Users i found new username lnorgaard

also in search I found recently viewed ticket with same username.

Nothing more in ticket but I found Comment about lnorgaard user in /Admin/Users/Modify with password: Welcome2023!

logged as Inorgaard to webpanel but nothing special was there so I tried ssh and here we go:

Gaining access

Starting with linpeas I spot mysql localport open but

better one to start with is in user home directory, a zip file:

Privilege escalation

after copy files to my machine and extracting zip we have keepass dump file and .kdbx file, tried to crack password via john but no hit with rockyou so I search for exploits and I found: https://github.com/matro7sh/keepass-dump-masterkey and I got results; ● is unknown character

Searching google with this letters I found something like “Rødgrød med fløde” which may be a password.

let’s try this ( we have keepass2 in kali repo), so start, select file passcodes.kdbx and paste password and we got access

Putty to id_rsa (ssh)

password didn’t work with ssh root but in note we have puTTY file, let’s save it on our machine and convert it via puttygen

puttygen putty -O private-openssh -o id_rsa
chmod 600 id_rsa
ssh -i id_rsa root@10.10.11.227