Vulnversity
Reconnaissance
s1: run an nmap scan | nmap -A -sC -p- -oN vulnersity.nmap 10.10.26.152
-A : aggresive scan, -sC : nmap script scan, -p- : scan all ports, -oN : save results
Scan the box; how many ports are open? | 6
What version of the squid proxy is running on the machine? | 3.5.12
How many ports will Nmap scan if the flag -p-400 was used? | 400
What is the most likely operating system this machine is running? | ubuntu
What port is the web server running on? | 3333
Locating directories using Gobuster
To get started, you will need a wordlist for Gobuster (which will be used to quickly go through the wordlist to identify if a public directory is available. If you are using Kali Linux, you can find many wordlists under /usr/share/wordlists. You can also use the wordlist for directories located at /usr/share/wordlists/dirbuster/directory-list-1.0.txt in the AttackBox.
gobuster dir -u http://10.10.26.152:3333 -w '/usr/share/wordlists/dirbuster/directory-list-1.0.txt'
directory listing found
/images (Status: 301) /css (Status: 301) /js (Status: 301) /internal
visit webpage | http://10.10.26.152:3333/
What is the directory that has an upload form page?
visit http://10.10.26.152:3333/internal
Last updated