Lab10 - Dirbuster
Lab10 - Dirbuster
Lab10 - Dirbuster
The goal of this lab is to first find the web servers in the network you are directly attached.
Then to test the Web Application running on it in order to check if you can access restricted
areas (such as the login page)!
• Dirbuster
• mysql
• Web browser
Now that we know there is a host on the target network, let us scan it and gather as much
information as we can about it. We are interested in web servers.
Once we have found a web server explore the Web Application from a web browser and
analyze it.
Remember that the goal of our tests is to access the restricted web area.
Now that you have an idea of how the Web Application works, run dirbuster and check if
there is any file that may be useful to access the login page!
You should have found two interesting files. Use the information stored in these two file to
access the DMBS.
As we can see the target network is 10.104.11.0/24. Let's run nmap -sn in order to
discover all the available hosts on the network:
The previous screenshot shows that there are two hosts alive in the network: 10.104.11.96
and 10.104.11.198.
From the results, we can see that the machine with IP address 10.104.11.96 is running
Apache on port 80, meaning that it is probably hosting the internal web application, while
the other machine (10.104.11.198) is running MySQL.
Since the scope of the engagement is to check if an attacker can access restricted areas of
the web application, let’s focus our tests on the machine 10.104.11.96.
If we inspect the web application, we can see that the "Sign up" page is not available,
meaning that we cannot create a new user in order to access the restricted area.
Moreover, we do not have any valid credential to use and the form seems not vulnerable to
any SQL injection attack.
Let us start dirbuster and run a scan using the directory-list-2.3.-small.txt file. After a
minute or two, we should start getting some interesting results:
As we can see, this time we are successfully logged into the database! Let us inspect it!
With the information just obtained, let us try to log into the web application: