Skills Assessment - Web Fuzzing


You are given an online academy's IP address but have no further information about their website. As the first step of conducting a Penetration Test, you are expected to locate all pages and domains linked to their IP to enumerate the IP and domains properly.

Finally, you should do some fuzzing on pages you identify to see if any of them has any parameters that can be interacted with. If you do find active parameters, see if you can retrieve any data from them.


Run a sub-domain/vhost fuzzing scan on '*.academy.htb' for the IP shown above. What are all the sub-domains you can identify? (Only write the sub-domain name)

โ•ญโ”€๎‚ฒ /home/h4shdumb ยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยทยท โœ” โ”‚ root@kali โ”‚ 12:19:10 ๎‚ฐโ”€โ•ฎ
โ•ฐโ”€ ffuf -w /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-5000.txt:FUZZ -u http://academy.htb:54501 -H 'Host: FUZZ.academy.htb' -fs 985         โ”€โ•ฏ

        /'___\  /'___\           /'___\       
       /\ \__/ /\ \__/  __  __  /\ \__/       
       \ \ ,__\\ \ ,__\/\ \/\ \ \ \ ,__\      
        \ \ \_/ \ \ \_/\ \ \_\ \ \ \ \_/      
         \ \_\   \ \_\  \ \____/  \ \_\       
          \/_/    \/_/   \/___/    \/_/       

       v2.1.0-dev
________________________________________________

 :: Method           : GET
 :: URL              : http://academy.htb:54501
 :: Wordlist         : FUZZ: /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-5000.txt
 :: Header           : Host: FUZZ.academy.htb
 :: Follow redirects : false
 :: Calibration      : false
 :: Timeout          : 10
 :: Threads          : 40
 :: Matcher          : Response status: 200-299,301,302,307,401,403,405,500
 :: Filter           : Response size: 985
________________________________________________

xxxxxxx                 [Status: 200, Size: 0, Words: 1, Lines: 1, Duration: 15ms]
xxxxxxx                 [Status: 200, Size: 0, Words: 1, Lines: 1, Duration: 16ms]
xxxx                    [Status: 200, Size: 0, Words: 1, Lines: 1, Duration: 3441ms]
:: Progress: [4989/4989] :: Job [1/1] :: 2325 req/sec :: Duration: [0:00:05] :: Errors: 0 ::

Before you run your page fuzzing scan, you should first run an extension fuzzing scan. What are the different extensions accepted by the domains?

circle-info

Add previous sub-domains on /etc/hosts and enumerate all of them.


One of the pages you will identify should say 'You don't have access!'. What is the full page URL?

circle-info

In your response, replace your port number by "PORT" in the URL.

i.e : http://academy.htb:54501/index.html --> http://academy.htb:PORT/index.html


In the page from the previous question, you should be able to find multiple parameters that are accepted by the page. What are they?


Try fuzzing the parameters you identified for working values. One of them should return a flag. What is the content of the flag?


Last updated