Expressway
hackthebox
Task: HackTheBox medium machine with IPsec VPN (strongSwan) on UDP/500 and SSH. Solution: Extract PSK hash via IKE Aggressive Mode, crack it, reuse password for SSH access, then exploit CVE-2025-32463 (sudo 1.9.17 chroot LPE via nsswitch.conf poisoning) for root.
$ ls tags/ techniques/
$ cat /etc/rate-limit
Rate limit reached (20 reads/hour per IP). Showing preview only — full content returns at the next hour roll-over.
Expressway — HackTheBox
Description
HackTheBox medium difficulty machine. Debian server with IPsec VPN (strongSwan) on UDP/500 and SSH on TCP/22. Initial access via PSK hash extraction from IKE Aggressive Mode and dictionary cracking, then password reuse for SSH. Privilege escalation through CVE-2025-32463 — a vulnerability in sudo 1.9.17 that allows loading an arbitrary shared library as root via nsswitch.conf substitution in a user-controlled chroot.
Reconnaissance
Port Scanning
Nmap discovered only 2 TCP ports:
- 22/tcp — SSH (OpenSSH 10.0p2 Debian)
- 53/tcp — unknown service (rabbit hole: connection establishes but any data causes "Network is down")
Key finding — UDP port 500 (IKE/ISAKMP):
nmap -sU -p 500 10.129.4.240 # 500/udp open isakmp
Analysis
IKE Enumeration
Probing the VPN service with ike-scan:
ike-scan 10.129.4.240
Result — IKEv1 Main Mode handshake with parameters:
- Encryption: 3DES
- Hash: SHA1
- DH Group: 2 (modp1024)
- Auth: PSK (Pre-Shared Key)
- XAUTH support
- Dead Peer Detection v1.0
Weak parameters (3DES + SHA1 + DH Group 2) and PSK authentication — classic vector for Aggressive Mode attack.
IKE Aggressive Mode — PSK Hash Extraction
IKEv1 Aggressive Mode transmits the PSK hash in cleartext (unlike Main Mode where identity is protected):
ike-scan --aggressive --id=vpn --pskcrack=ike_hash.txt 10.129.4.240
Server responded with Aggressive Mode handshake and revealed its identity:
- Server ID:
[email protected](ID_USER_FQDN) - PSK hash saved to
ike_hash.txt
PSK Cracking
psk-crack -d rockyou.txt ike_hash.txt
PSK: freakingrockstarontheroad
Solution
Step 1: User Access — SSH via Password Reuse
From IKE identity [email protected] extracted username ike. VPN PSK reused as SSH password:
sshpass -p 'freakingrockstarontheroad' ssh [email protected]
Successful login as ike (uid=1001, groups: ike, proxy).
cat /home/ike/user.txt # d92ebe2ef753a2414aff0ba42be769c6
Step 2: Enumeration for Privilege Escalation
...
$ grep --similar
Similar writeups
- [pentest][free]Interpreter (Mirth Connect → f-string Injection)— hackthebox
- [infra][free]Pterodactyl— hackthebox
- [pentest][free]WingData (Wing FTP RCE → Python tarfile PATH_MAX bypass)— hackthebox
- [forensics][free]An unusual sighting— hackthebox
- [web][free]Conversor (Full Box)— hackthebox