
1. Enumeration:
- Nmap scan:

Web Enumeration:

checking robots.txt » found this /admin-dir

visiting /admin-dir/credentials.txt
[Internal mail account]
w.cooper@admirer.htb
fgJr6q#S\W:$P
[FTP account]
ftpuser
%n?4Wz}R$tTF7
[Wordpress account]
admin
w0rdpr3ss01!

Gobuster:
$gobuster dir -w /usr/share/golismero/wordlist/fuzzdb/Discovery/PredictableRes/raft-medium-directories.txt -u 10.10.10.187/admin-dir/ -x php,txt -s 200


revealed this /contacts.txt
##########
# admins #
##########
# Penny
Email: p.wise@admirer.htb
##############
# developers #
##############
# Rajesh
Email: r.nayyar@admirer.htb
# Amy
Email: a.bialik@admirer.htb
# Leonard
Email: l.galecki@admirer.htb
#############
# designers #
#############
# Howard
Email: h.helberg@admirer.htb
# Bernadette
Email: b.rauch@admirer.htb

FTP enumeration:
logging in with ftpuser and password: %n?4Wz}R$tTF7

login succeeded , let’s dump these files:
$ wget --user ftpuser --password '%n?4Wz}R$tTF7' -m ftp://10.10.10.187

So we downloaded the files dump.sql and html.tar.gz
- dump.sql » has nothing useful


- index.php:
$servername = "localhost";
$username = "waldo";
$password = "]F7jLHw:*G>UPrTo}~A"d6b";
$dbname = "admirerdb";

- looking in
w4ld0s_s3cr3t_d1r:
[Bank Account]
waldo.11
Ezy]m27}OREc$
[Internal mail account]
w.cooper@admirer.htb
fgJr6q#S\W:$P
[FTP account]
ftpuser
%n?4Wz}R$tTF7
[Wordpress account]
admin
w0rdpr3ss01!

looking in /utility-scripts/db_admin.php:
$servername = "localhost";
$username = "waldo";
$password = "Wh3r3_1s_w4ld0?";

checking /utility-scripts:

Gobuster again:
$ gobuster dir -u http://10.10.10.187/utility-scripts/ -w /usr/share/dirb/wordlists/big.txt -t 30 -x php,txt -s 200

found this /adminer


