network

TryHackMe - RootMe - Oct 30th 2023

TryHackMe - RootMe - Oct 30th 2023

Target is: (Given)

Recon

nmap [TARGET_IP] --top-ports 4000 -T5 --open -oN openPorts.txt PORT STATE SERVICE 22/tcp open ssh 80/tcp open http

nmap -sC -sV [TARGET_IP] -p22,80 -T5 --open -oN rootMe-nmap-run1.txt PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 2048 4a:b9:16:08:84:c2:54:48:ba:5c:fd:3f:22:5f:22:14 (RSA) | 256 a9:a6:86:e8:ec:96:c3:f0:03:cd:16:d5:49:73:d0:82 (ECDSA) |_ 256 22:f6:b5:a6:54:d9:78:7c:26:03:5a:95:f3:f9:df:cd (ED25519) 80/tcp open http Apache httpd 2.4.29 ((Ubuntu)) |_http-title: HackIT - Home |http-server-header: Apache/2.4.29 (Ubuntu) | http-cookie-flags: | /: | PHPSESSID: | httponly flag not set Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

time to look for a hidden directory

dirb [TARGET_IP]

DIRB v2.22 By The Dark Raver

START_TIME: Tue Oct 31 00:44:28 2023 URL_BASE: http://[TARGET_IP]/ WORDLIST_FILES: /usr/share/dirb/wordlists/common.txt


GENERATED WORDS: 4612

---- Scanning URL: http://[TARGET_IP]/ ---- ==> DIRECTORY: http://[TARGET_IP]/css/