OFFSEC
https://tryhackme.com/room/introtooffensivesecurity
Last updated
https://tryhackme.com/room/introtooffensivesecurity
Last updated
Walkthrough for "Intro to Offensive Security"
Operating System: Linux
nmap-auto $TARGET all
python3 dirsearch.py -e txt,html,php,sh -w /home/z3r0/Resources/wordlists/dir-list.txt -t 10 -u http://10.10.25.12/
Trying out numbers mostly gave a failure code, something weird was happening so I decided to inspect the javascript that was running behind the scenes with Ctrl-I, following the function pay()
attached to the submit button, I was led to the script.js file which showed me the next clue:
The only time the function will execute is when the from value is 2276 and the to value is 8881. Trying exactly that allows the function to execute and transfer money to the negative page on the dashboard! The dashboard now shows a splash note for congratulations as well as a positive balance.
Enumerating the given IP shows that there exists a web page called "Fake Bank". The site is being hosted on both port 80 and 3000 i.e . The only valuable information so far is the name "Mrs G. Benjamin" and the bank account number 8881. The page doesn't have much else, so it's time to enumerate the directories:
The only result that shows is . Navigating to this page shows the below: