penetration

Offsec - CyberSploit1 - Apr 20th 2023

Offsec - CyberSploit1 - Apr 20th 2023

OG Vulnhub box: https://www.vulnhub.com/entry/cybersploit-1,506/

Since target was given I don't have to run netdiscover to find target:

Target is: [LAB_IP]

$ nmap [LAB_IP] -p- -sV

Starting Nmap 7.93 ( https://nmap.org ) at 2023-04-20 17:07 EDT

Nmap scan report for [LAB_IP]

Host is up (0.0013s latency).

Not shown: 65533 closed tcp ports (conn-refused)

PORT   STATE SERVICE VERSION

22/tcp open  ssh     OpenSSH 5.9p1 Debian 5ubuntu1.10 (Ubuntu Linux; protocol 2.0)

80/tcp open  http    Apache httpd 2.2.22 ((Ubuntu))Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .

Nmap done: 1 IP address (1 host up) scanned in 9.31 seconds

Check firefox on 80

This image shows up. Time to check directories and subdirectories. Time to run dirb and subdirwith the former for directories(website.com/page1) and latter for subdirectories such as app.website.com

???(kali?kali)-[~]

??$ dirb http://[LAB_IP]


DIRB v2.22

By The Dark Raver


START_TIME: Thu Apr 20 21:19:08 2023

URL_BASE: http://[LAB_IP]/

WORDLIST_FILES: /usr/share/dirb/wordlists/common.txt


GENERATED WORDS: 4612

---- Scanning URL: http://[LAB_IP]/ ----

  • http://[LAB_IP]/cgi-bin/ (CODE:403|SIZE:289)