PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.4.29 ((Ubuntu))
|_http-title: Site doesn't have a title (text/html; charset=UTF-8).
|_http-server-header: Apache/2.4.29 (Ubuntu)
┌──(kali㉿VirtualBox)-[~]
└─$ gobuster dir -u 192.168.158.15 -w /usr/share/wordlists/dirb/common.txt -q -t 200
/.htpasswd (Status: 403) [Size: 279]
/.htaccess (Status: 403) [Size: 279]
/admin (Status: 200) [Size: 417]
/.hta (Status: 403) [Size: 279]
/index.php (Status: 200) [Size: 201]
/server-status (Status: 403) [Size: 279]
At the end of the View Source on /admin
we found one comment:
<!--passphrase:harder-->
Only these? Nothing else?!! So we have to go back to basics and enumerate with another wordlist
┌──(kali㉿VirtualBox)-[~]
└─$ gobuster dir -u <http://192.168.158.15/> -w /usr/share/wordlists/dirb/big.txt -q -t 200 -x php
/.htpasswd (Status: 403) [Size: 279]
/.htaccess (Status: 403) [Size: 279]
/.htaccess.php (Status: 403) [Size: 279]
/.htpasswd.php (Status: 403) [Size: 279]
/admin (Status: 200) [Size: 417]
/index.php (Status: 200) [Size: 201]
/server-status (Status: 403) [Size: 279]
/superadmin.php (Status: 200) [Size: 152]
Just found out /dirb/big.txt
could be useful than dirbuster medium list
Whenever we submit the Query its super duper slow but bare with it
Besides using /dirb/big.txt
, there is another way to get superadmin.php
This Spiderman named haclabs.jpg
is one of the images from /admin
page.
┌──(kali㉿VirtualBox)-[~]
└─$ steghide extract -sf haclabs.jpeg
Enter passphrase:
wrote extracted data to "imp.txt".
┌──(kali㉿VirtualBox)-[~]
└─$ cat imp.txt
c3VwZXJhZG1pbi5waHA=
┌──(kali㉿VirtualBox)-[~]
└─$ echo "c3VwZXJhZG1pbi5waHA=" | base64 --decode
superadmin.php
Since this is another ping host website maybe we can do some command injection, base on our TryHackMe King aldeid
he has this page explaining command injection to shell