AirTouch
AirTouch is a medium-difficulty Linux box that takes you on a multi-hop wireless exploitation journey across three network segments. You’ll crack WPA-PSK handshakes, capture and decrypt WiFi traffic to steal session cookies, run a WPA-Enterprise evil twin attack with real CA certificates, and crack MSCHAPv2 credentials to pivot into a corporate VLAN — all from a Docker container with seven simulated wireless interfaces.
Overview
The attack chain looks like this:
- SNMP enumeration leaks SSH credentials → initial foothold in a Docker container on the Consultant VLAN (172.20.1.0/24)
- WPA-PSK crack on AirTouch-Internet → pivot to Tablets VLAN (192.168.3.0/24)
- Traffic decryption + cookie theft → admin access to a router web panel → RCE → user flag
- Router loot yields real RADIUS CA/server certs
- WPA-Enterprise evil twin with real certs on 5 GHz → MSCHAPv2 capture → crack credentials
- WPA-Enterprise client connection to AirTouch-Office → Corp VLAN (<VPN_IP>/24)
- World-readable EAP user database on AP management host → admin SSH → root flag
Full Writeup
The detailed walkthrough is encrypted while this box is active on HackTheBox.
Enter the root flag to unlock the full writeup.
Incorrect flag. Try again.