# Skills Assessment

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FjGRZglnSfzacGFimDWLj%2Fimage.png?alt=media&#x26;token=c8c43577-2a78-4d32-b8b5-db35dcf5685d" alt=""><figcaption></figcaption></figure>

First we have to enter the IP in our /etc/hosts

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2Fb56Yw2r1ZDD2J2UjygZZ%2Fimage.png?alt=media&#x26;token=71d2f8ee-c37c-4f94-9eec-a0814e69376f" alt=""><figcaption></figcaption></figure>

Then we are going to find the subdomain of the website academy.htb

{% code overflow="wrap" %}

```
ffuf -u http://academy.htb:52527 -w /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-5000.txt -H 'Host: FUZZ.academy.htb' -fs 985
```

{% endcode %}

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2Fxuu0L7UNC2Gm7STvmNKM%2Fimage.png?alt=media&#x26;token=973ce4ec-2624-4992-9974-c6eb74a75b49" alt=""><figcaption></figcaption></figure>

Just put the findings in our /etc/hosts

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FJQktnalbTqdbqtaB06ij%2Fimage.png?alt=media&#x26;token=f10f337d-4166-4bf2-bc73-c2d20f07a181" alt=""><figcaption></figcaption></figure>

Then we are going to find the extensions for those subdomain

* First domain - academy

{% code overflow="wrap" %}

```
ffuf -u http://academy.htb:52527/indexFUZZ -w /usr/share/wordlists/seclists/Discovery/Web-Content/web-extensions.txt
```

{% endcode %}

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FqtHvzllohzYxVTV0Q9vd%2Fimage.png?alt=media&#x26;token=6da2498e-7c3d-4ae8-b01e-05a9d1cd7f50" alt=""><figcaption></figcaption></figure>

* Second subdomain - faculty

{% code overflow="wrap" %}

```
ffuf -u http://faculty.academy.htb:52527/indexFUZZ -w /usr/share/wordlists/seclists/Discovery/Web-Content/web-extensions.txt
```

{% endcode %}

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FllIsIAqrFvyxqi7FYW4M%2Fimage.png?alt=media&#x26;token=18320586-dc91-47bc-89dc-2e6f3ed097b8" alt=""><figcaption></figcaption></figure>

* third subdomain - archive

{% code overflow="wrap" %}

```
ffuf -u http://archive.academy.htb:52527/indexFUZZ -w /usr/share/wordlists/seclists/Discovery/Web-Content/web-extensions.txt
```

{% endcode %}

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FmJuF2Ii3FCgN9IZJ4ELh%2Fimage.png?alt=media&#x26;token=59ed2e6f-4c58-4961-891f-b2d19917ccd0" alt=""><figcaption></figcaption></figure>

* fourth subdomain - test

{% code overflow="wrap" %}

```
ffuf -u http://test.academy.htb:52527/indexFUZZ -w /usr/share/wordlists/seclists/Discovery/Web-Content/web-extensions.txt
```

{% endcode %}

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2F22e4GI2MUcIGngUlBx0f%2Fimage.png?alt=media&#x26;token=658f73be-b569-43ff-9853-b31197574bd1" alt=""><figcaption></figcaption></figure>

Here the code below we found a directory that is called /courses

{% code overflow="wrap" %}

```
ffuf -u http://faculty.academy.htb:30807/FUZZ -w /usr/share/wordlists/seclists/Discovery/Web-Content/directory-list-2.3-small.txt -e .php,.phps,.php7 -fs 287 -recursion -recursion-depth 1 -v
```

{% endcode %}

After we found the extensions we are now going to find the directories in the subdomain and in the faculty we did found the directory - /linux-security.php7 in the /courses

{% code overflow="wrap" %}

```
ffuf -u http://faculty.academy.htb:30807/courses/FUZZ -w /usr/share/wordlists/seclists/Discovery/Web-Content/directory-list-2.3-small.txt -e .php,.phps,.php7 -fs 287 -recursion -recursion-depth 1 -v
```

{% endcode %}

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FH9QYS40rcQDHqruUAcXz%2Fimage.png?alt=media&#x26;token=22d4d5a3-3973-4db8-86d5-1f4cdc45fa05" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FbJOim4GXsJAVFEFS8fdG%2Fimage.png?alt=media&#x26;token=7e5b74e7-248a-4416-8183-f78be3f3b784" alt=""><figcaption></figcaption></figure>

After that we are going to find a parameter name in that directory&#x20;

{% code overflow="wrap" %}

```
ffuf -u http://faculty.academy.htb:30807/courses/linux-security.php7?FUZZ=key -w /usr/share/wordlists/seclists/Discovery/Web-Content/burp-parameter-names.txt -fs 774
```

{% endcode %}

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FPUlNev3d9XlAzsfJUkRy%2Fimage.png?alt=media&#x26;token=e7649f72-7ebb-47c9-9ed6-e22c1400695a" alt=""><figcaption></figcaption></figure>

{% code overflow="wrap" %}

```
ffuf -u http://faculty.academy.htb:30807/courses/linux-security.php7 -w /usr/share/wordlists/seclists/Discovery/Web-Content/burp-parameter-names.txt -X POST -d "FUZZ=key" -H 'Content-Type: application/x-www-form-urlencoded' -fs 774
```

{% endcode %}

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FViniJVZGzuH5d3tnDHXd%2Fimage.png?alt=media&#x26;token=46a3a5bc-896f-4caa-9fff-bb076566fe80" alt=""><figcaption></figcaption></figure>

{% code overflow="wrap" %}

```
ffuf -u http://faculty.academy.htb:30807/courses/linux-security.php7 -w /usr/share/wordlists/seclists/Usernames/xato-net-10-million-usernames.txt -X POST -d 'username=FUZZ' -H 'Content-Type: application/x-www-form-urlencoded' -fs 781
```

{% endcode %}

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FE3L2G4jAQrssQHle179c%2Fimage.png?alt=media&#x26;token=b7bdb37c-5540-4033-b47a-b04d36774c8a" alt=""><figcaption></figcaption></figure>

{% code overflow="wrap" %}

```
curl http://faculty.academy.htb:30807/courses/linux-security.php7 -X POST -d 'username=harry' -H 'Content-Type: application/x-www-form-urlencoded'
```

{% endcode %}

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FBYKn4afyo5XodsbJAtLn%2Fimage.png?alt=media&#x26;token=0b52bcd2-4f31-4e4c-a772-1ddd098b9a27" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FGLiw1A6jXgSB6ifE0oI6%2Fimage.png?alt=media&#x26;token=49b66721-73e3-4a12-bfc3-8800dd9f4e0b" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FSBhOcpH5ezaRYPI97aV0%2Fimage.png?alt=media&#x26;token=f2f1bdcb-3ef1-416c-8db4-43020b21deca" alt=""><figcaption></figcaption></figure>
