Preignition HackTheBox Walkthrough. Learn cyber security.

Preignition Walkthrough | HackTheBox

This is a simple walkthrough for completing the Dancing target machine in Hackthebox.com.

Task 1

Question: What is considered to be one of the most essential skills to possess as a Penetration Tester?

Answer: dir busting

Preignition HackTheBox Walkthrough. Learn cyber security.

Task 2

Question: What switch do we use for nmap’s scan to specify that we want to perform version detection?

Answer: -sV

Preignition HackTheBox Walkthrough. Learn cyber security.

Task 3

Question: What service type is identified as running on port 80/tcp in our nmap scan?

Answer: http

Preignition HackTheBox Walkthrough. Learn cyber security.

Task 4

Question: What service name and version of service is running on port 80/tcp in our nmap scan?

Answer: nginx 1.14.2

Preignition HackTheBox Walkthrough. Learn cyber security.

Task 5

Question: What is a popular directory busting tool we can use to explore hidden web directories and resources?

Answer: Gobuster

Preignition HackTheBox Walkthrough. Learn cyber security.

Task 6

Question: What switch do we use to specify to gobuster we want to perform dir busting specifically?

Answer: dir

Preignition HackTheBox Walkthrough. Learn cyber security.
$gobuster -h
Usage:
  gobuster [command]

Available Commands:
  dir         Uses directory/file enumeration mode
  dns         Uses DNS subdomain enumeration mode
  fuzz        Uses fuzzing mode
  help        Help about any command
  s3          Uses aws bucket enumeration mode
  version     shows the current version
  vhost       Uses VHOST enumeration mode

Flags:
      --delay duration    Time each thread waits between requests (e.g. 1500ms)
  -h, --help              help for gobuster
      --no-error          Don't display errors
  -z, --no-progress       Don't display progress
  -o, --output string     Output file to write results to (defaults to stdout)
  -p, --pattern string    File containing replacement patterns
  -q, --quiet             Don't print the banner and other noise
  -t, --threads int       Number of concurrent threads (default 10)
  -v, --verbose           Verbose output (errors)
  -w, --wordlist string   Path to the wordlist

Use "gobuster [command] --help" for more information about a command.

Task 7

Question: What page is found during our dir busting activities?

Answer: admin.php

Preignition HackTheBox Walkthrough. Learn cyber security.
$ gobuster dir -w /usr/share/wordlists/dirb/common.txt -u 10.129.125.3

Task 8

Question: What is the status code reported by gobuster upon finding a successful page?

Answer: 200

Preignition HackTheBox Walkthrough. Learn cyber security.

Task 9

Submit Flag

Since we can see that there is a directory file named admin.php, we can simply open up a browser and navigate to this directory using the IP address followed by the directory name.

When we navigate to this directory, the first thing that shows up is a login prompt.

Preignition HackTheBox Walkthrough. Learn cyber security.

The first thing we can try is to check for any misconfigured settings such as default credentials. If we try admin for username and admin for password, we will be able to obtain the flag.

Preignition HackTheBox Walkthrough. Learn cyber security.

Mission accomplished.

Similar Posts