eJPT-CTF-1: Assessment Methodologies: Information Gathering CTF 1

Table of contents

This lab focuses on information gathering and reconnaissance techniques to analyze a target website. Participants will explore various aspects of the website to uncover potential vulnerabilities, sensitive files, and misconfigurations. By leveraging investigative skills, they will learn how to identify critical information that could assist in further penetration testing or exploitation.

💡
the machine is within a private network, so you can’t use online enumeration tools like sublist3r, or theHarvester. I’ve used the following tools hence: gobuster, nmap and curl

Lab Environment

A website is accessible at target.ine.local. Perform reconnaissance and capture the following flags.

  • Flag 1: This tells search engines what to and what not to avoid.

  • Flag 2: What website is running on the target, and what is its version?

  • Flag 3: Directory browsing might reveal where files are stored.

  • Flag 4: An overlooked backup file in the webroot can be problematic if it reveals sensitive configuration details.

  • Flag 5: Certain files may reveal something interesting when mirrored.

Tools

  • Firefox

  • Curl

  • HTTrack


Note

In this lab, the flag will follow the format: FLAG1{MD5Hash} OR FL@G1{MD5Hash}. For example, FLAG1{0f4d0db3668dd58cabb9eb409657eaa8}. You need to submit only the MD5 hash string, excluding the braces. For instance: 0f4d0db3668dd58cabb9eb409657eaa8.

This tells search engines what to and what not to avoid.
visit: target.ine.local/robots.txt

What website is running on the target, and what is its version?

nmap -sC target.ine.local

Directory browsing might reveal where files are stored.

The stack is wordpress and Apache, so google potential directories in wordpress that can have listing enabled, here’s a list:

An overlooked backup file in the webroot can be problematic if it reveals sensitive configuration details.

Certain files may reveal something interesting when mirrored.