Vulnbegin
Subdomain Discovery
DNS Infos
nslookup -type=any vulnbegin.co.uk 8.8.8.8
Server: 8.8.8.8
Address: 8.8.8.8#53
Non-authoritative answer:
Name: vulnbegin.co.uk
Address: 68.183.255.206
vulnbegin.co.uk nameserver = ns1.digitalocean.com.
vulnbegin.co.uk nameserver = ns2.digitalocean.com.
vulnbegin.co.uk nameserver = ns3.digitalocean.com.
vulnbegin.co.uk
origin = ns1.digitalocean.com
mail addr = hostmaster.vulnbegin.co.uk
serial = 1626211765
refresh = 10800
retry = 3600
expire = 604800
minimum = 1800
vulnbegin.co.uk text = "[^FLAG^BED649C4DB2DF265BD29419C13D82117^FLAG^]"
Authoritative answers can be found fromDNS Bruteforce
dnsrecon -d vulnbegin.co.uk -D ~/Dokumente/ctfchallenge/wordlists/subdomains.txt -t brt
{"error":"User Not Authenticated","flag":"[^FLAG^E858ED9649E57BECE9ACD1A4C60D3446^FLAG^]"}%
SSL Certificate Records
A great resource for these SSL records is crt.sh if you visit https://crt.sh/?q=vulnbegin.co.uk you'll be able to see records of SSL certificates that have been registered for vulnbegin.co.uk
v64hss83.vulnbegin.co.uk
v64hss83.vulnbegin.co.uk
vulnbegin.co.uk
*.vulnbegin.co.uk / vulnbegin.co.uk
Checking Domain v64hss83.vulnbegin.co.uk
[^FLAG^047524FE61AE6B5FD1D184994C7322FC^FLAG^]
Content Discovery
Brute Force
Checking for Valid Users
Bruteforcing Password
Flag
Login to http://www.vulnbegin.co.uk/cpadmin using credentials admin:159753 Flag: [^FLAG^93D7491FB4B054FB5C5AC3E0292BE41C^FLAG^]
Content Discovery #2
Visiting http://www.vulnbegin.co.uk/cpadmin/env we find the flag and a probably interesting header X-Token for the api {"api_key":"X-Token: 492E64385D3779BC5F040E2B19D67742","flag":"[^FLAG^F6A691584431F9F2C29A3A2DE85A2210^FLAG^]"}
API Recon
Check the API
Search for API Endpoints
Check for IDOR
Last updated