<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[HTB: AirTouch]]></title><description><![CDATA[<p>HTB: AirTouch</p><p></p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://0xdf.gitlab.io/2026/04/18/htb-airtouch.html" title="HTB: AirTouch">
<img src="https://0xdf.gitlab.io/img/airtouch-cover.png" class="card-img-top not-responsive" style="max-height:15rem" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a href="https://0xdf.gitlab.io/2026/04/18/htb-airtouch.html">
HTB: AirTouch
</a>
</h5>
<p class="card-text line-clamp-3">AirTouch simulates a wireless network environment. I’ll start by pulling a default password from SNMP to SSH as a consultant user inside a container with virtual wireless interfaces. From there, I’ll capture and crack a WPA2-PSK handshake to join the tablet network, then decrypt the captured traffic in WireShark to recover session cookies for a router management site. A client-side role cookie gates an admin upload feature, where I’ll bypass the PHP extension filter with a phtml file to get RCE. Hardcoded credentials in the source give me the next user, and sudo gets me root, where I find the CA and server certs for the corporate wireless network. I’ll use those with eaphammer to stand up an evil twin of AirTouch-Office and capture a PEAP-MSCHAPv2 challenge, which cracks to reveal a user’s password. That gets me onto the corporate network, where a hostapd eap_user file leaks an admin password, and sudo gets me to root.</p>
</div>
<a href="https://0xdf.gitlab.io/2026/04/18/htb-airtouch.html" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://0xdf.gitlab.io/assets/icons/favicon-32x32.png" alt="favicon" class="not-responsive overflow-hiddden" style="max-width:21px;max-height:21px" />





<p class="d-inline-block text-truncate mb-0">0xdf hacks stuff <span class="text-secondary">(0xdf.gitlab.io)</span></p>
</a>
</div><p></p><p>Read on HackerWorkspace: <a href="https://hackerworkspace.com/article/htb-airtouch" rel="nofollow noopener"><span>https://</span><span>hackerworkspace.com/article/ht</span><span>b-airtouch</span></a></p><p><a href="https://infosec.exchange/tags/authentication" rel="tag">#<span>authentication</span></a> <a href="https://infosec.exchange/tags/vulnerability" rel="tag">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/exploit" rel="tag">#<span>exploit</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/5bc45651-8894-4acd-bbf0-99a9386dfda2/htb-airtouch</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 00:32:46 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/5bc45651-8894-4acd-bbf0-99a9386dfda2.rss" rel="self" type="application/rss+xml"/><pubDate>Mon, 20 Apr 2026 18:48:34 GMT</pubDate><ttl>60</ttl></channel></rss>