HTB: Preignition Walkthrough

Prepared By Araiz Naqvi.
Overview
- Difficulty: Easy
- Operating System: Linux
- Objective: Capture flag via Bruteforcing
- Tools Used: nmap, gobuster, openvpn
Nmap Scans
Let’s start with stealth scanning default ports using the -sS flag:

I now just out of curiosity to know what servers are set up maybe might come of use later.
So, I use the service scan with some default script scans:

From this I get the idea that nginx 1.14.2 is in use.
Browsing Webpage
Since port 80 is open means a webpage might be available to view.
Upon browsing:

I next check the source code which has nothing at all that might look interesting:

Bruteforcing Directories
The next option I usually think of wrt to open http pages is bruteforcing directories.
So, I use gobuster with Seclists common.txt word list:

Browsing admin.php
Upon browsing there’s a login page.
Not even making this up the first thing any hacker might think is admin:admin, and quite precisely it works XD!

Comments
Post a Comment