Tryhackme - Content Discovery

Tryhackme – Content Discovery

In this walk through, we will be going through the Content Discovery room from Tryhackme. This room will teach you the various ways of discovering hidden or private content on a webserver that could lead to new vulnerabilities. So on that note, let’s get started.

Content Discovery

Task 1 – What is Content Discovery?

Question 1 – What is the Content Discovery method that begins with M?

Manually

Question 2 – What is the Content Discovery method that begins with A?

Automated

Question 3 – What is the Content Discovery method that begins with O?

OSINT

Task 1 - What is Content Discovery?

Task 2 – Manual Discovery: Robots.txt

Question 1 – What is the directory in the robots.txt that isn’t allowed to be viewed by web crawlers?

staff-portal

staff portal

robots.txt

Task 2 - Manual Discovery: Robots.txt

Task 3 – Manual Discovery: Favicon

Use favicon to get information about the framework that target application is using.

OWASPhttps://wiki.owasp.org/index.php/OWASP_favicon_database

  • Find the favicon area of the website by viewing source. Here: view-source:https://static-labs.tryhackme.cloud/sites/favicon/images/favicon.ico
  • use the curl command to download the favicon and get his MD5 hash. curl https://static-labs.tryhackme.cloud/sites/favicon/images/favicon.ico | md5sum
  • Compare it with OWASP favicon database to get the framework used in the website.
  • if hash ends with 427e, then curl failed.

curl and hash

Hash captured – f276b19aabcb4ae8cda4d22625c6735f

Question 1 – What framework did the favicon belong to?

cgiirc

OWASP favicon

Task 3 - Manual Discovery: Favicon

Task 4 – Manual Discovery: Sitemap.xml

Question 1 – What is the path of the secret area that can be found in the sitemap.xml file?

/s3cr3t-area

sitemap.xml

Task 4 - Manual Discovery: Sitemap.xml

Task 5 – Manual Discovery: HTTP Headers

Question 1 – What is the flag value from the X-FLAG header?

THM{HEADER_FLAG}

curl the ip

curl flag

Task 5 - Manual Discovery: HTTP Headers

Task 6 – Manual Discovery: Framework Stack

THM Web Framework

THM Framework default credentials –

  • Username – admin

  • Password – admin

Question 1 – What is the flag from the framework’s administration portal?

THM{CHANGE_DEFAULT_CREDENTIALS}

Flag

Task 6 - Manual Discovery: Framework Stack

Task 7 – OSINT: Google Hacking / Dorking

Question 1 – What Google dork operator can be used to only show results from a particular site?

site:

Task 7 - OSINT: Google Hacking / Dorking

Task 8 – OSINT: Wappalyzer

Question 1 – What online tool can be used to identify what technologies a website is running?

Wappalyzer

Task 8 - OSINT: Wappalyzer

Task 9 – OSINT: Wayback Machine

Question 1 – What is the website address for the Wayback Machine?

https://archive.org/web/

Task 9 - OSINT: Wayback Machine

Task 10 – OSINT: GitHub

Question 1 – What is Git?

Version control system

Task 10 - OSINT: GitHub

Task 11 – OSINT: S3 Buckets

Question 1 – What URL format do Amazon S3 buckets end in?

 .s3.amazonaws.com

Task 11 - OSINT: S3 Buckets

Task 12 – Automated Discovery

dirb scan

gobuster scan

ffuf scan

Question 1 – What is the name of the directory beginning “/mo….” that was discovered?

/monthly

Question 2 – What is the name of the log file that was discovered?

/development.log

Task 12 - Automated Discovery

Also Read: Tryhackme – Chill Hack

Conclusion:

Conclusion

So this was “Content Discovery” room for you. We covers the basics of content discovery from robots.txt to directory bruteforcing with different tools. Getting familiar with these techniques and tools will definitely help you in your bug bounty journey. So on that note, i will take your leave for the day but remember to “Hack the planet” for the meanwhile.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top