Apache web server (port 50000)

Login with found credentials

We can login with the found credentials from the previous steps, where we will retrieve our first flag!

Enumeration

We can perform a simple directory enumeration using the wordlist, with authentication details set via the cookie:

  • Notice that the -x php option is added to the command

  • The authentication details will be set via the -H "Cookie: PHPSESSID=xxx" value. The PHPSESSID value can be found from the network inspection of the initial GET request to load the webpage.

$ gobuster dir -u http://<target>:50000 -w <wordlist> -x php -H "Cookie: PHPSESSID=xxx"

I decided to visit a few interesting looking routes:

uploads

A single file profile.png exists. Perhaps, we can somehow find a way to upload a web shell?

templates

There were nothing of interest in this directory.

The other routes will be ignored due to the having no content (size: 0) or forbidden.

Last updated