Ignition (Tier 1)

Description

  • Tier -> 1

  • Difficult -> Very Easy

  • OS -> Linux

  • Tags -> Common Applications / Magento / Reconnaissance / Web Site Structure Discovery / Weak Credentials

Write-up

  • I started doing an initial scan using Nmap

nmap 10.129.246.174 -p- -Pn --min-rate 2500 -oN scan.txt

  • Then I did an exhaustive scan to learn more about the services running on the open ports

nmap 10.129.246.174 -p80 -sVC -oN serv_scan.txt

  • With this, I answered the first question

Answer: nginx 1.14.2


  • As I found the HTTP protocol running on port 80, I visited the deployed content on the browser. When I tried to reach the site using the IP address it redirected me to the ignition.htb domain whose content wasn't possible to display


  • To check what could be happening I used the curl command to get information from the response of the petition sent to the web. This could be because I didn't have the domain in our list of known hosts. So to solve that, I added it to the /etc/hosts and after that visited the site again and it worked properly

curl -v http://10.129.246.174
echo '10.129.246.174 ignition.htb' >> /etc/hosts
snippet

  • With this and a little research, I answered the next questions

Answer: 302


Answer: ignition.htb


Answer: /etc/hosts


  • I explored the features of the page but didn't find anything relevant, so I tried fuzzing the URL using Gobuster to find some possible directories and files exposed on the web

gobuster dir -u http://ignition.htb -w /usr/share/wordlists/SecLists/Discovery/Web-Content/common.txt -o fuzz.txt
snippet

  • I found some interesting routes, the most relevant being the /admin route, so I navigated there to see the content and found a login page for the Magento CMS


  • With this and a little research, I answered the next questions

Answer: http://ignition.htb/admin


Answer:


  • As I didn't have any credentials I tried using some common credentials, and doing a little research about this topic, I found that by using the username admin and the password qwerty123 I gained access to the administrator dashboard. Finally looking at the deployed content, I found the flag at first sight


  • With this, I got the root flag and pwned the machine

Answer: 797d6c988d9dc5865e010b9410f247e0

Last updated