Unified
To Do:
Check UniFi Version 5.4.54 Vulnerability
Interact with Nagios NSCA through port 8443 - login page
Interact with database port 6789
Identify service running on 8843
Identify service running on 8880
RECON
Port 8443/tcp - Nagios NSCA (SSL) - popular monitoring system
Service: Nagios NSCA over SSL
Port 8080 redirects to 8443
UniFi Network Version 6.4.54
Login page: https://10.129.26.178:8443/manage/account/login?redirect=%2Fmanage
Forgot Password page: https://10.129.26.178:8443/manage/account/forgotpassword?redirect=%2Fmanage%2Faccount%2Fforgotpassword
It uses JSON with a /status page, raw data: {"meta":{"rc":"ok","up":true,"server_version":"6.4.54","uuid":"8918a2b4-6f90-4f13-8233-e29085bd16d7"},"data":[]}
user flag->6ced1a6a89e666c0620cdb10262ba127
So I used metasploit to get a shell
Then i followed steps of an article to get the root password. What the fuck.s