🔬HTTP Enumeration
Lab 1 - Method Enumeration
Target IP:
192.41.48.3Credentials:
john:password
ip -br -c a
eth1@if193355 UP 192.41.48.2/24 Open the browser and navigate to
http://192.41.48.3/login.php
View Source code of the login page and check the
POSTmethod

Login with the provided credentials
Follow the remaining links
http://192.41.48.3/post.phphttp://192.41.48.3/index.php
Dirb
Enumerate hidden directories using
dirb

📌 Hidden directories are
css,img,js,uploads,vendor
Curl
Use
curlto send some requests

Use
curlto interact withlogin.phpandpost.php

Interact with
uploadsdirectory

📌
WebDAVmodule is enabled on the Apache Server and allows file upload viaPUTmethod.
Upload a file with
PUTmethod

BurpSuite
🔬 Check the BurpSuite Basics lab here
Target IP has changed to
192.83.140.3Use
BurpSuiteto interact with the web page, by turning on theFoxyProxyFirefox plugin and opening the BurpSuite with the Proxy intercept on.Capture the home page and send it to
RepeaterUse the various options to sed requests and check the response.


Try to login in the webpage, intercept the request and send it to the repetear
Send a
POSTtologin.phpwith valid credentials

Try to upload a file to
/uploads/


Lab 2 - Directory Enumeration
🔬 Directory Enumeration with Gobuster
Target IP:
192.185.38.3Enumerate a Multillidae II vulnerable web app
Open the browser and navigate to
http://192.185.38.3/

Use
gobusterto enumerate directories, ignoring403and404status codes

Scan to find specific file extensions and interesting files


Check the
xmlfilehttp://192.185.38.3/data/accounts.xml

Burp Suite
🔬 Directory Enumeration with Burp Suite
Target IP:
192.221.162.3Enumerate a Multillidae II vulnerable web app
Open the browser and navigate to
http://192.221.162.3/Activate FoxyProxy Plugin
Start
BurpSuite(set User options/Display/Look to Darcula and restart BurpSuite)Intercept the home page request and send it to
IntruderIntruder- setHOSTtarget IP andPORTConfigure
Payload PositionsClear §
Add
§name§in theGETrequest
Payloads - Options- add a list of strings and load the/usr/share/wordlists/dirb/common.txtlistStart Attackand check the status code




Navigate to
http://192.221.162.3/passwords/accounts.txt

Last updated
Was this helpful?