Hack The Box: Starting Point - Oopsie
Enumeration At the beginning of the penetration test, we usually have only the list of target IP addresses and nothing more. In order to exploit any machine, any information about the target is crucial. Thus, I'm going to enumerate running services with the help of nmap. This very important step will give me a direction to follow along the process. The ssh service is running on the default port 22 and a web application is hosted on port 80 . Furthermore, it appears that the machine is running Linux OS, a Ubuntu incarnation specifically. The obvious next step is to look at the application with the help of the HTTP protocol. It's the site of MegaCorp Automotive and they are dealing with electric cars. If you scroll down a little bit you will see that the application provides a login service. This resource it's not accessible from the main page, thus we can try to find it with dirb for instance. These are all directories found by dirb with the default wordlist. There is ...