Machine Info
Machine Info

1. Enumeration:

  • Nmap: To scan for open ports and services
  • $ nmap -sC -sV 10.10.10.217

So Three ports are opened 22:ssh 80:http 443:https

There are two domain names in nmap result(DNS:cereal.htb, DNS:source.cereal.htb), Let’s add them in our /etc/hosts file:

2. Web Enumeration:

  • cereal.htb

    • There is a simple login page:
  • source.cereal.htb

    • gives us an error page contains path of file(C:\inetpub\source\default.aspx):
  • Gobuster or dirsearch:

$ gobuster dir -u http://source.cereal.htb/ -w /usr/share/ raft-small-words.txt -t 50 or with common.txt wordlist

$ python3 /home/sehs/dirsearch/dirsearch.py -u http://source.cereal.htb -w /usr/share/dirb/wordlists/raft-small-words.txt -e txt,html,php,log,zip,bac,bak,tar

let’s checkout the .git

git clone https://github.com/internetwache/GitTools
cd GitTools/Dumper/
ls
cat README.md
bash gitdumper.sh http://source.cereal.htb/.git/ dist-dir            

$ bash gitdumper.sh http://source.cereal.htb/.git/ /home/sehs/Downloads/cereal/dump/

  • Extractor script:
    • extract commits and their content from a broken repository.
cd ../Extractor/
ls
cat README.md
bash extractor.sh ../../dump/ dist-dir/all_dump/

$ bash extractor.sh /home/sehs/Downloads/cereal/dump/ /home/sehs/Downloads/cereal/all_dump/

So now we got our git files

And extracted them into all_dump

So it seems we got the source code of the application running … let’s look for the authentication mechanism or any other interesting stuff …

  • After roaming a bit, found secret:

var key = Encoding.ASCII.GetBytes(“secretlhfIH&FY*#oysuflkhskjfhefesf”);

Secret : secretlhfIH&FY*#oysuflkhskjfhefesf