HTB: Preignition Walkthrough

Writeup — PreIgnition By Araiz Naqvi

Prepared By Araiz Naqvi.

Overview

- Difficulty: Easy
- Operating System: Linux
- Objective: Capture flag via Bruteforcing
- Tools Used: nmap, gobuster, openvpn


Nmap Scans

Let’s start with stealth scanning default ports using the -sS flag:

I now just out of curiosity to know what servers are set up maybe might come of use later.
So, I use the service scan with some default script scans:

From this I get the idea that nginx 1.14.2 is in use.


Browsing Webpage

Since port 80 is open means a webpage might be available to view.
Upon browsing:

I next check the source code which has nothing at all that might look interesting:


Bruteforcing Directories

The next option I usually think of wrt to open http pages is bruteforcing directories.
So, I use gobuster with Seclists common.txt word list:


Browsing admin.php

Upon browsing there’s a login page.
Not even making this up the first thing any hacker might think is admin:admin, and quite precisely it works XD!


Comments

Popular posts from this blog

HTB: Redeemer Walkthrough

HTB: Nibbles Walkthrough

HTB: Cap Walkthrough