Skills Assessment - Web Fuzzing
Run a sub-domain/vhost fuzzing scan on '*.academy.htb' for the IP shown above. What are all the sub-domains you can identify? (Only write the sub-domain name)
Subdomain fuzzing didn't lead to any results. Ffuf ran for over 30 min and ended up returning just errors. You might want skip to vhost fuzzing and save some time 👍
ffuf -w /opt/useful/SecLists/Discovery/DNS/subdomains-top1million-5000.txt:FUZZ -u http://FUZZ.academy.htb/With vhost fuzzing I notice a pattern, so I decided to add the flag -fs 985 to see if I catch something interesting .
ffuf -w /opt/useful/SecLists/Discovery/DNS/subdomains-top1million-5000.txt:FUZZ -u http://academy.htb:46699 -H 'Host: FUZZ.academy.htb' -fs 985
And we successfully enumerate three VHosts!
Before you run your page fuzzing scan, you should first run an extension fuzzing scan. What are the different extensions accepted by the domains?

One of the pages you will identify should say 'You don't have access!'. What is the full page URL?
In order to find the correct answer I had to fuzz each subdomain and their respective extensions.
To find the correct page I used the following command:

In the page from the previous question, you should be able to find multiple parameters that are accepted by the page. What are they?
Get method

Post method

And with the Post method we fuzzed two parameters, user and username
Try fuzzing the parameters you identified for working values. One of them should return a flag. What is the content of the flag?

Now to see the content of the page we use the curl command to retrieve the HTML code

As you can see we found the last flag!
Last updated