Blacklight: 1 Walkthrough
Lab Environment Attacker’s Machine : Linux kali 4.18.0-kali2-amd64 #1 SMP Debian 4.18.10-2kali1 (2018-10-09) x86_64 GNU/Linux Vulnerable Machine : Blacklight: 1 Let’s start hacking and breach the security of this machine Scanning Phase : Let’s start with knowing our attacking machine’s ip Syntax used : ifconfig Results : 192.168.1.6 Now let’s scan our local network to which attacking machine and vulnerable machine is connected. Syntax used : arp-scan --local Results : 192.168.1.8 Enumeration Phase : Now using nmap to scan the services running on ports . Syntax used : nmap -p- -A 192.168.1.8 -Pn Results : http service is running on port 80 and one port 9072 is open Now browsing the IP in browser to see the webpage running Now fired up dirb to reveal the directories Syntax used : dirb http;//192.168.1.8 Results : got something in robots.txt Now browsing the url of robots.t