Virtual Hosts
For this lab we are asked to enumerate 5 vHosts targets. The web server is 10.129.194.60 and vHosts to be fuzzed s www.inlanefreight.htb
The most efficient way to enumerate this vHost is by using the ffuf
tool with this wordlist by SecList.
The following command is the first time I tried to identified the flags within the vHosts found
ffuf -w ./vhosts -u http://10.129.194.60 -H "HOST: FUZZ.inlanefreight.htb"

As we can see from the output, almost all of the vHosts have a Content Length 10918 size. With a very large list (more than 150000 words)!
It would be a very tedious job to lookup in all of these results.
We are also assuming the Flag is not in a vHost with a 10918 sized Content Lenght. But typically what draws our attention are uncommon results. So let’s try to filter all vHosts by adding a filter to the end of the last command.
ffuf -w ./vhosts -u http://10.129.194.60 -H "HOST: FUZZ.inlanefreight.htb" -fs 10918

As we can see, with the filter we narrowed our results to just 6 targets. Much more doable
Then instead of manually lookup individually for each vHost let’s try to automatize this process. First lets gather all the results to a single file:
ap
app
citrix
customers
dmz
www2
Then let’s adapt the script from HTB with a few teaks in order to lookup to the desire information:
cat ./results | while read results;do echo "\n********\nFUZZING: ${results}\n********";curl -s http://inlanefreight.htb -H "HOST: ${results}.inlanefreight.htb" | grep "FLAG\|HTB";done

Enumerate the target and find a vHost that contains flag No. 1. Submit the flag value as your answer (in the format HTB{DATA}).
HTB{h8973hrpiusnzjoie7zrou23i4zhmsxi8732zjso}
Enumerate the target and find a vHost that contains flag No. 2. Submit the flag value as your answer (in the format HTB{DATA}).
HTB{u23i4zhmsxi872z3rn98h7nh2sxnbgriusd32zjso}
Enumerate the target and find a vHost that contains flag No. 3. Submit the flag value as your answer (in the format HTB{DATA}).
HTB{Fl4gF0uR_o8763tznb4xou7zhgsniud7gfi734}
Enumerate the target and find a vHost that contains flag No. 4. Submit the flag value as your answer (in the format HTB{DATA}).
HTB{bzghi7tghin2u76x3ghdni62higz7x3s}
Find the specific vHost that starts with the letter "d" and submit the flag value as your answer (in the format HTB{DATA}).
HTB{7zbnr4i3n7zhrxn347zhh3dnrz4dh7zdjfbgn6d}
Last updated