Another “very easy” box in the “starting point” trail by Hack the Box - number 6. Let’s start with our initial recon.
The questions for the box point towards a “next step” of directory bruteforcing with gobuster
. Let’s follow the lead. What does running the command tell us about using the command?
Alright, there are a lot of useful flags there.
After some googling I found out that
Daniel Miesler’s Seclist repository is actually included under /opt/useful/
. So I created a symlink of /opt/useful/seclists/Discovery/Web-Content/common.txt
into my home directory, and ran gobuster
with the -x php
flag, as that was hinted to in the questions.
Interestingly enough, we have a http 200 on a file called admin.php. This means we can succesfully complete a webrequest to it.
After opening the url in the webbrowser (http://{target}/admin.php), I get a login screen.
At this point, I could bruteforce the application. Or I could just try my luck by manually entering usernames. Like admin/admin for example.
Preignition, check!