Intro


As a part of our SDLC process, we’ve got our firmware ready for security testing. Can you help us by performing a security assessment?

i have been given a single binary firmware that appear to have a demo instance on 157.245.39.76:32624

┌──(kali㉿kali)-[~/archive/htb/challenges/the_niddle]
└─$ nc 157.245.39.76 32624
��������
hwtheneedle-1009898-74bb69c747-sbb2z login: admin
admin
password: password
 
Login incorrect
hwtheneedle-1009898-74bb69c747-sbb2z login:
Login timed out after 60 seconds

Connecting to the instance prompts for authentication and times out if no user input is given after 60 seconds

┌──(kali㉿kali)-[~/archive/htb/challenges/the_niddle]
└─$ file firmware.bin                  
firmware.bin: Linux kernel ARM boot executable zImage (big-endian)
 
┌──(kali㉿kali)-[~/archive/htb/challenges/the_niddle]
└─$ binwalk firmware.bin                                                               
 
DECIMAL       HEXADECIMAL     DESCRIPTION
--------------------------------------------------------------------------------
0             0x0             Linux kernel ARM boot executable zImage (big-endian)
14419         0x3853          xz compressed data
14640         0x3930          xz compressed data
538952        0x83948         squashfs filesystem, little endian, version 4.0, compression:xz, size: 2068458 bytes, 995 inodes, blocksize: 262144 bytes, created: 2021-03-11 03:18:10

The given firmware is a Linux kernel ARM boot executable I will attempt to extract the content