Machine info
Machine info

1. Enumeration:

  • Nmap scan:

Web Enumeration:

checking robots.txt » found this /admin-dir

visiting /admin-dir/credentials.txt

[Internal mail account]
w.cooper@admirer.htb
fgJr6q#S\W:$P

[FTP account]
ftpuser
%n?4Wz}R$tTF7

[Wordpress account]
admin
w0rdpr3ss01!

Gobuster:

$gobuster dir -w /usr/share/golismero/wordlist/fuzzdb/Discovery/PredictableRes/raft-medium-directories.txt -u 10.10.10.187/admin-dir/ -x php,txt -s 200

revealed this /contacts.txt

##########
# admins #
##########
# Penny
Email: p.wise@admirer.htb

##############
# developers #
##############
# Rajesh
Email: r.nayyar@admirer.htb

# Amy
Email: a.bialik@admirer.htb

# Leonard
Email: l.galecki@admirer.htb

#############
# designers #
#############
# Howard
Email: h.helberg@admirer.htb

# Bernadette
Email: b.rauch@admirer.htb

FTP enumeration: logging in with ftpuser and password: %n?4Wz}R$tTF7

login succeeded , let’s dump these files:

$ wget --user ftpuser --password '%n?4Wz}R$tTF7' -m ftp://10.10.10.187

So we downloaded the files dump.sql and html.tar.gz

  • dump.sql » has nothing useful

  • index.php:
$servername = "localhost";
                        $username = "waldo";
                        $password = "]F7jLHw:*G>UPrTo}~A"d6b";
                        $dbname = "admirerdb";

  • looking in w4ld0s_s3cr3t_d1r:
[Bank Account]
waldo.11
Ezy]m27}OREc$

[Internal mail account]
w.cooper@admirer.htb
fgJr6q#S\W:$P

[FTP account]
ftpuser
%n?4Wz}R$tTF7

[Wordpress account]
admin
w0rdpr3ss01!

looking in /utility-scripts/db_admin.php:

$servername = "localhost";
  $username = "waldo";
  $password = "Wh3r3_1s_w4ld0?";

checking /utility-scripts:

Gobuster again:

$ gobuster dir -u http://10.10.10.187/utility-scripts/ -w /usr/share/dirb/wordlists/big.txt -t 30 -x php,txt -s 200

found this /adminer