🔬HTTP Enumeration
Last updated
Last updated
Target IP:
192.41.48.3
Credentials:
john
:password
Open the browser and navigate to
http://192.41.48.3/login.php
View Source code of the login page and check the POST
method
Login with the provided credentials
Follow the remaining links
http://192.41.48.3/post.php
http://192.41.48.3/index.php
Enumerate hidden directories using dirb
📌 Hidden directories are
css
,img
,js
,uploads
,vendor
Use curl
to send some requests
Use curl
to interact with login.php
and post.php
Interact with uploads
directory
📌
WebDAV
module is enabled on the Apache Server and allows file upload viaPUT
method.
Upload a file with PUT
method
🔬 Check the BurpSuite Basics lab here
Target IP has changed to 192.83.140.3
Use BurpSuite
to interact with the web page, by turning on the FoxyProxy
Firefox plugin and opening the BurpSuite with the Proxy intercept on.
Capture the home page and send it to Repeater
Use the various options to sed requests and check the response.
Try to login in the webpage, intercept the request and send it to the repetear
Send a POST
to login.php
with valid credentials
Try to upload a file to /uploads/
🔬 Directory Enumeration with Gobuster
Target IP:
192.185.38.3
Enumerate a Multillidae II vulnerable web app
Open the browser and navigate to
http://192.185.38.3/
Use gobuster
to enumerate directories, ignoring 403
and 404
status codes
Scan to find specific file extensions and interesting files
Check the xml
file
http://192.185.38.3/data/accounts.xml
🔬 Directory Enumeration with Burp Suite
Target IP:
192.221.162.3
Enumerate a Multillidae II vulnerable web app
Open the browser and navigate to
http://192.221.162.3/
Activate FoxyProxy Plugin
Start BurpSuite
(set User options/Display/Look to Darcula and restart BurpSuite)
Intercept the home page request and send it to Intruder
Intruder
- set HOST
target IP and PORT
Configure Payload Positions
Clear §
Add §name§
in the GET
request
Payloads - Options
- add a list of strings and load the /usr/share/wordlists/dirb/common.txt
list
Start Attack
and check the status code
Navigate to http://192.221.162.3/passwords/accounts.txt