Instruction
Try running some of the web enumeration techniques you learned in this section on the server above, and use the info you get to get the flag.
Spawn the target and start the instance.
Recon
1. Curl
Check headers information using Curl. The output is indicate that the server is using Apache/2.4.41 (Ubuntu)
based on the header information.
curl -IL 94.237.57.115:56798
If you interest to know what -IL means, refer to the curl man page like below:
2. WhatWeb
Check the web technologies on using WhatWeb
.
whatweb 94.237.57.115:56798
3. Directory and File enumeration
In this case we use GoBuster
for this task. If you look at the command, it is using wordlist from SecLists
gobuster dir -u http://94.237.57.115:56798 -w /usr/share/seclists/Discovery/Web-Content/common.txt
After running GoBuster using wordlists Web-Content/common.txt
we found that the target is have a Wordpress
path.
Investigate
1. Wordpress path
If we open the /wordpress
path, it looks like the Wordpress
site is in setting mode, and not configured yet.
2. Robots.txt file
Next check the robots.txt
by open the /robots.txt
path in browser, we found something interesting. Indicate that the site have disallowed path named /admin-login-page.php
Lets open the path in the browser.
3. Check Disallow path from robots.txt
Wow nice we found a login page with username and password.
But looks like, we don’t have any credential yet for login in the web.
4. Investigating the source
Now try to investigate the page source by View Page Source
like below from the Login page.
After view the source and read about the source, we found an interesting comment in the source. This is a comment that include credentials username and password.
Now lets use this credentials to login in the site.
5. Flag
Try to use the credentials from comment in page source, and yes we success logged in in this site. The flag showed!!
Submit the flag and we did it!