🔬HTTP Enumeration
Lab 1 - Method Enumeration
Target IP:
192.41.48.3Credentials:
john:password
ip -br -c a
eth1@if193355 UP 192.41.48.2/24 Open the browser and navigate to
http://192.41.48.3/login.php
View Source code of the login page and check the
POSTmethod

Login with the provided credentials
Follow the remaining links
http://192.41.48.3/post.phphttp://192.41.48.3/index.php
Dirb
Enumerate hidden directories using
dirb
dirb http://192.41.48.3
📌 Hidden directories are
css,img,js,uploads,vendor
Curl
Use
curlto send some requests
# GET
curl -X GET 192.41.48.3
# HEAD
curl -I 192.41.48.3
# OPTIONS
curl -X OPTIONS 192.41.48.3 -v
# POST
curl -X POST 192.41.48.3
# PUT
curl -X PUT 192.41.48.3
Use
curlto interact withlogin.phpandpost.php
curl -X OPTIONS 192.41.48.3/post.php -v
Allow: GET,POST,HEAD,OPTIONS
curl -X OPTIONS 192.41.48.3/login.php -v
Allow: GET,POST,HEAD,OPTIONS
curl -X POST 192.41.48.3/login.php -d "name=john&password=password" -v
Interact with
uploadsdirectory
curl -X OPTIONS 192.41.48.3/uploads/ -v
📌
WebDAVmodule is enabled on the Apache Server and allows file upload viaPUTmethod.
Upload a file with
PUTmethod
echo "Hello Hackers" > hello.txt
curl 192.41.48.3/uploads/ --upload-file hello.txt
curl -X DELETE 192.41.48.3/uploads/hello.txt -vBurpSuite
🔬 Check the BurpSuite Basics lab here
Target IP has changed to
192.83.140.3Use
BurpSuiteto interact with the web page, by turning on theFoxyProxyFirefox plugin and opening the BurpSuite with the Proxy intercept on.Capture the home page and send it to
RepeaterUse the various options to sed requests and check the response.


Try to login in the webpage, intercept the request and send it to the repetear
Send a
POSTtologin.phpwith valid credentials

Try to upload a file to
/uploads/


Lab 2 - Directory Enumeration
🔬 Directory Enumeration with Gobuster
Target IP:
192.185.38.3Enumerate a Multillidae II vulnerable web app
ip -br -c a
eth1@if203734 UP 192.185.38.2/24
nmap -sS -sV 192.185.38.2Open the browser and navigate to
http://192.185.38.3/

Use
gobusterto enumerate directories, ignoring403and404status codes
gobuster dir -u http://192.185.38.3 -w /usr/share/wordlists/dirb/common.txt -b 403,404
Scan to find specific file extensions and interesting files
gobuster dir -u http://192.185.38.3 -w /usr/share/wordlists/dirb/common.txt -b 403,404 -x .php,.xml,.txt -r
# -u = url string
# -w = wordlist
# -b = status code blacklist
# -x = extensions string
# -r = follow redirect
gobuster dir -u http://192.185.38.3/data -w /usr/share/wordlists/dirb/common.txt -b 403,404 -x .php,.xml,.txt -r
Check the
xmlfilehttp://192.185.38.3/data/accounts.xml

Burp Suite
🔬 Directory Enumeration with Burp Suite
Target IP:
192.221.162.3Enumerate a Multillidae II vulnerable web app
ip -br -c a
eth1@if203734 UP 192.221.162.2/24
nmap -sS -sV 192.221.162.3Open the browser and navigate to
http://192.221.162.3/Activate FoxyProxy Plugin
Start
BurpSuite(set User options/Display/Look to Darcula and restart BurpSuite)Intercept the home page request and send it to
IntruderIntruder- setHOSTtarget IP andPORTConfigure
Payload PositionsClear §
Add
§name§in theGETrequest
Payloads - Options- add a list of strings and load the/usr/share/wordlists/dirb/common.txtlistStart Attackand check the status code




Navigate to
http://192.221.162.3/passwords/accounts.txt

Last updated
Was this helpful?