Expressway - Easy


1st Step :

using Nmap I got port of UDP using -sU

sudo nmap -sV -T3 -vv -sU -Pn -p 500 10.10.11.87 

2nd Step : (Psk CAPTURE ATTACK)

here you get to know that ISAKMP protocol is running which is a protocol that runs for CIA traids .

Brief-

Psec is widely recognized as the principal technology for securing communications between networks (LAN-to-LAN) and from remote users to the network gateway (remote access), serving as the backbone for enterprise VPN solutions.

The establishment of a security association (SA) between two points is managed by IKE, which operates under the umbrella of ISAKMP, a protocol designed for the authentication and key exchange

PORT    STATE SERVICE REASON     VERSION
500/udp open  isakmp? script-set

3rd Step :

from here we use main mode -M for service enumeration and got nothing important

sudo ike-scan -M 10.10.11.87
OUTPUT: 
Starting ike-scan 1.9.6 with 1 hosts (<http://www.nta-monitor.com/tools/ike-scan/>)

Ending ike-scan 1.9.6: 1 hosts scanned in 2.452 seconds (0.41 hosts/sec).  0 returned handshake; 0 returned notify

So we did aggressive scan -A to get more detailed output

in here, we discovered that there is a user name given in Value that is “ike” and

Vulnerability exploitation - Psk Capture Attack-

Its a critical vuln that lies ike-aggressive mode design flaw unlike main mode aggressive mode transmits the identity and psk hash in plain test making it sustainable to capture and offilne cracking attacks

we got our Hash text here

then using psk-crack we cracked the hash text getitng output as

now here we got the pass


3rd Step :

I got the initial access using id:pass I got earlier that is -

and here you get the user flag :


4th Step :

now to get the root flag you have to know what all permissons you have and by checking it you get to know that you dont have root permisson , fir that what you can do is

Or do


5th Step :

now from here you get the version , here you will get the version and now will get the exploit accordingly -

here you can get the exploit so take it copy it and run into the terminal -

https://github.com/kh4sh3i/CVE-2025-32463/blob/main/exploit.sharrow-up-right

here it the exploit code -

after excution you will get into root -

in terminal :

now you get the flag

SHER BOLTE!!

DIRECT ROOT ACCESS

Last updated

Was this helpful?