HTB Academy, Penetration Testing, Web Fuzzing, Feroxbuster, Gobuster, Caido, FFUF, Recursive Fuzzing, Hidden Vhost

HTB Academy Web Fuzzing Skills Assessment

Walkthrough of the HTB Academy Web Fuzzing Skills Assessment


Skills Assessment

Introduction

To complete this Skills Assessment, you will need to apply the multitude of tools and techniques showcased throughout this module. All fuzzing can be completed using the common.txt SecLists Wordlist, found at /usr/share/seclists/Discovery/Web-Content on Pwnbox, or via the SecLists GitHub.

Target: 83.136.253.5:59043

After completing all steps in the assessment, you will be presented with a page that contains a flag in the format of HTB{...}. What is that flag?

Starting off by running feroxbuster against the target endpoint

Fuzzing with feroxbuster

feroxbuster -u http://83.136.253.5:59043 -w /usr/share/wordlists/seclists/Discovery/Web-Content/common.txt  -x "php" -k -q -e -r -t 200
 
404      GET        9l       31w      277c Auto-filtering found 404-like response and created new filter; toggle off with --dont-filter403      GET        9l       28w      280c Auto-filtering found 404-like response and created new filter; toggle off with --dont-filterScanning: http://83.136.253.5:59043/                                                                           200      GET        1l        2w       13c http://83.136.253.5:59043/admin/
200      GET        1l        2w       13c http://83.136.253.5:59043/admin/index.php
200      GET        1l        8w       58c http://83.136.253.5:59043/admin/panel.php
Scanning: http://83.136.253.5:59043/
Scanning: http://83.136.253.5:59043/admin/            

Navigating to http://83.136.253.5:59043/admin/panel.php

image.png

This error indicates that I should fuzz values for a parameter called accessID

To fuzz for parameters I want to learn Caido so I am going to turn on my proxy in foxy proxy and redirect request to caido

To make bruteforcing in caido a bit easier first I sent a request in my browser utilizing the accessID parameter and setting it to a dummy value of 1

image.png

I sent the captured request —> sent it to replay —> sent it to automate —> highlighted the 1 and clicked + —> made the worked 100 to speed it up

image.png

This redirects me to the fuzzing_fun.htb

Add this to my /etc/hosts file

image.png

Loading this page

image.png

It hints to me that recursive fuzzing will be required and that I might need to fuzz for other vhost

##Vhost Fuzzing with gobuster Fuzzing for additional vhost with gobuster

gobuster vhost -u http://fuzzing_fun.htb:59043/ -w /usr/share/seclists/Discovery/Web-Content/common.txt --append-domain

Running gobuster without filtering out 403 status codes returned alot of content so I filtered that out

Running gobuster without filtering out a content length of 305 gave alot of content so I filtered that out

gobuster vhost -u http://fuzzing_fun.htb:59043/ -w /usr/share/seclists/Discovery/Web-Content/common.txt --append-domain -xs 403 -xl 305

image.png

This finds hidden.fuzzing_fun.htb:59043

I need to add this to my /etc/hosts file as well

image.png

This points me in the direction of /godeep

image.png

Going to /godeep in the hidden vhost brings me to this page

image.png

Running feroxbuster on the /godeep directory

Feroxbuster on /godeep

feroxbuster -u http://hidden.fuzzing_fun.htb:59043/godeep/ -w /usr/share/wordlists/seclists/Discovery/Web-Content/common.txt  -x "php" -k -q -e -r -t 200

image.png

The pages before the last level of recursion hint me in the direction to keep going. Doing so brings me to the flag finally.

image.png