Scanning and Enumeration
Scanning
Enumeration
Port 3000
port 3000 appears to be a web server, lets check it out.
Potential Usernames:
tom
mark
rastating
Found Login
Redirecting Gobuster to BURP
Gobuster does not work, therefore we will analyze on burp spider. On Burp Spider (on the target tab, you may need to change your settings and enable proxy), we are able to find:
Analyzing on the webrowser, we find the following:
Checking those files, we are able to find the following:
Found hashes
Not much luck, looks like we are going to have to login to get this file, but where could we get credentials? Looking further, we were able to find some interesting information in the /api/users/latest path. These appear to be hashes.
Notice how these are the latest? if we get rid of latest from the path we get more information. It appears that we get an admin hash
Identifying hashes
Found Passwords
manchester is admins password
spongebob is toms password
snowflake is marks password
Last updated
Was this helpful?