Dark Crop
Ping
I verified whether I could communicate or if the IP address was up.
The IP address is up. Now I can communicate with the IP address.
Nmap
Then used Nmap to
- Version detection scan
Result
There are two open ports:
- 22 ssh and,
- 80 hhtp
Web enumeration
I used wappalyzer extension to find the framework the website used.
Whatweb
Upon researching I found the tool called whatweb that also detects the framework used same like the wappplyzer.
Result
I found that the website used:
- The web server used is nginx version 1.22.1.
- Used Bootstrap for frond-end
Then I checked the vulnerability of ngnix 1.22.1 in exploit database, but i found nothing.
Then I searched the IP address and I was navigated to the drip.htb and this error appeared
DNS resolution is not setup in etc/hosts file. Now let’s resolve the DNS resolution using vim(text editor).
After solving the DNS resolution I was directed to the /index directory and got this page
I navigated to the sign-in page and then found this
I was then navigated to the mail.drip.htb
Same like the drip.htb error I resolve the DNS by editing the /etc/hosts
Then I was able to find the page and I found this login page.
I then used ffuf to brute force the directory
Result
- Found mail.
This mail subdomain was already found when I navigated to the sign-in page.
Result
- Found contact
- index.html
- register
I have registered as a user to find out what the website is about
after signing in I found this page
- The page is mainly about the mails
Then I was stuck here then I backtracked it and I again gathered information.
Enumeration
WPScan
I browsed the tools that are used to scan the subdomains and I found this Wpscan.
- WPScan is used for searching for vulnerabilities, such as weak passwords and outdated plugins.
I was not able to get the result because the website is not running on WordPress.
- I understood that the WPScan is used for the website using WordPress.
ferric oxide
I then found a tool called ferric oxide
Result
- Found only two 200 status code. Both are the same. It is the landing page.
Nikto
- Nikto scans for insecure files and programs.
Result
I have found that the X-Content-Type-Options header is not set.
- This could allow browsers to interpret files in unintended ways, leading to security issues like MIME-type sniffing attacks.
- Found multiple index files: /index.php, /index.asp, /index.html, /default.aspx, etc.