I managed to get to the last question in the Skills Assement of the updated Information Gathering - Web Edition
" What is the API key the inlanefreight.htb developers will be changing too?"
I tried to use FinalRecon to enumerate the inlanefreight.htb in order to find the api key.
thi is the command i’m using gobuster vhost -u http://inlanefreight.htb:52951 -w /opt/SecLists/Discovery/DNS/subdomains-top1million-110000.txt --append-doma
in
Yeah I’m not sure what happened but I kept trying and eventually got it lol… for anyone else stuck once you find the correct vhost re read the crawling section there’s a new tool that instantly finds the api key. The robots.txt is bait. Good luck dm or reply if you need more help
HTB changed the files names and the directories name in the new update of the pwnbox.
I urge you to check the path and the file names.
For example, see how they change the following path:
/usr/share/seclists/Discovery/DNS - see seclists
After tryhard, i’m finish this module, this 's difficult for me. I have read and consulted many people’s instructions.
to be able to solve it, let’s add first target ip and vHost domain to /etc/hosts, brute force vhost to find new vhost, add it to /etc/hosts and do it again See if you can find anything new.
use crawing tools and reconnaise tools learned in the lesson applies to all domain, directory path found to find flag.
Finally, try hard and you will succeed
I managed to complete all the points on the assestment, except for the question
What is the API key in the hidden admin directory that you have discovered on the target system?
I would like to request a hint to solve it, I’ve already managed to get all the other questions but i could not get the API key based on the robots.txt file.
Thanks.
Edit: I tried to use Gobuster on the robots.txt admin domain, but still didnt got any answer.
Edit 2: Found it. Used gobuster with the common.txt
Hi @Jomomo05 ,can you kindly give a tip about this gobuster with common.txt you used?
I tried with gobuster or ffuf with this wordlist but no success (to look for subdomain or endpoint)
Is there a third subdomain or where to look for this admin URL ??
Assuming that you already found the robots.txt file, you have to use gobuster on dir mode using the URL of the disallowed domain AND the disallowed directory. As an example: .htb:12345/thisdirectory/