Information Gathering - Web Edition

This project was a personal skill assessment after completing the learning path on HTB. The goal is to show information gathering techniques while providing clues for others to use the process

Reconnaissance

Before we start we need to put our assinged IP address in to virtual host.

1
nano /etc/hosts 

hosts

To kick off the reconnaissance phase, I started with a WHOIS lookup on inlanefreight.com to gather registrar-specific details. This step is crucial for identifying administrative and technical contacts, registration dates, and registrar information, which can often provide leads for further exploration or social engineering.

Command:

1
whois inlanefreight.com | grep -i 'Registrar IANA ID'

Output:

WHOIS Lookup

The WHOIS query revealed that the Registrar IANA ID is ***, indicating the domain is registered with a specific registrar that may be worth investigating further for any potential vulnerabilities or historical data leaks.

Following this, I aimed to identify the HTTP server software that powers the inlanefreight.htb domain. Understanding the server type helps in tailoring specific exploits or identifying known vulnerabilities associated with that server software.

Command:

1
curl -i inlanefreight.htb:43906

Output:

HTTP Server Info

The HTTP response headers indicated the site is running ***. Knowing this, I can cross-reference nginx-specific vulnerabilities or misconfigurations, especially if the server is outdated.

Next, I used Gobuster to enumerate subdomains of inlanefreight.htb. This process helps uncover hidden or less obvious subdomains that might host sensitive or development environments.

Command:

1
gobuster vhost -u http://inlanefreight.htb:43906 -w /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-110000.txt --append-domain

Output:

Gobuster Subdomain Enumeration

The scan revealed a subdomain: webxxxx.inlanefreight.htb. After discovering this, I added it to my /etc/hosts file to ensure proper DNS resolution.

Command to Add to /etc/hosts:

1
XXX.XXX.XX.XX webxxxx.inlanefreight.htb

With webxxxx.inlanefreight.htb resolved, I examined its robots.txt file to identify any restricted directories.

Command:

1
curl -i webxxxx.inlanefreight.htb:33972/robots.txt

Output:

robots.txt Content

The Disallow directive revealed a hidden admin directory: /admin_h1dd3n. I probed this directory for more information.

Command:

1
curl -i webxxxx.inlanefreight.htb:33972/admin_h1dd3n/

Output:

Hidden Admin Panel

The admin page returned a message indicating that the panel was under maintenance, but it unexpectedly disclosed an API key:

API Key: **********************

After this discovery, I decided to run Gobuster again on webxxxx.inlanefreight.htb to identify any additional subdomains.

Command:

1
gobuster vhost -u http://webxxxx.inlanefreight.htb:33972 -w /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-110000.txt --append-domain

Output:

Gobuster VHost Enumeration

This scan revealed another subdomain: dev.webxxxx.inlanefreight.htb. I added this to my /etc/hosts file as well.

Command to Add to /etc/hosts:

1
XXX.XXX.XX.XX xxx.webxxxx.inlanefreight.htb

etc

To automate and deepen the information gathering process, I utilized ReconSpider targeting xxx.webxxxx.inlanefreight.htb:33972. ReconSpider helped me crawl amd find data from multiple sources, providing a good overview of the target.

Command:

1
python3 ReconSpider.py http://xxx.webxxxx.inlanefreight.htb:33972

By pointing the discovered subdomains to the correct IP addresses in my /etc/hosts file, I ensured seamless navigation and interaction with the target systems.

host

Output:

ReconSpider Output

The scan revealed an internal contact email:

Email: ***************

it also showed me the api key

Source Code Comment with API Key

<!-- Remember to change the API key to ********************** -->

This shows that the API key may soon be rotated, telling us the current key might still be in use but will likely be replaced in the near future. This information could be crucial for timing any attacks that rely on API key authentication.

Conclusion

By using a combination of WHOIS lookups, HTTP header analysis, Gobuster enumeration, ReconSpider scanning, source code inspection, and virtual host enumeration, I gathered alot of critical information about the target system. The data collected includes registrar details, server configurations, API credentials, internal contact information, and an extensive list of active subdomains.