© 2018 Caendra Inc. - Hera For Waptv3 - Information Gathering
© 2018 Caendra Inc. - Hera For Waptv3 - Information Gathering
Once you are connected in VPN to the lab environment, all the web applications will be
available at the following URL: http://info.infogat.site/.
There are three main sections for each type of lab: Video, Lab, Challenges.
• Video section contains web applications used during video lessons. Therefore, if
you need any information about the scenario, the attacks and so on, please refer to
the corresponding video.
• Labs section contains web application where you can practice the techniques of the
specific module and have solutions. You can find them later in this manual
• Challenges labs do not have solutions; otherwise, why call them challenges? If you
study the course and think like a penetration tester, you will achieve the goal!
The best tool is, as usual, your brain. Then you may need of:
• Web Browser
• Burp Suite
• Dirbuster
Once you have your virtual network ready, configure the following IP address as default
DNS: 10.100.13.37
• WINDOWS: change the property of the TAP network device, adding as first DNS
server of the IP of the server.
• LINUX: add an entry into /etc/resolv.conf file with the IP address of the server
Use information gathering techniques and tools in order to find all the images stored in
the web application. One of them contains a secret!
Once the proxy is configured and you are able to intercept all the requests and the
responses, add the target host to the scope.
Once the target web application has been added to the scope, click on the filter menu and
select the “Show only in-scope items.” Moreover, since we are going to focus our tests on
images, be sure to check the “Images” box in the MIME type filter.
Burp will automatically issue a few requests against the web application. You can check
them in the spider tab.
Now that we have a better overview of the web application, we can see in the tree view that
there is a folder named gallery, which contains six images.
The images are all linked somewhere in the web application, and burp is automatically able
to find them. If we inspect the names, we can see that they are just incremental numbers.
Since our goal is to find hidden images, we can use URL fuzzing to retrieve unlinked
information from the server.
Of course, we cannot do it manually…it will require too much time. We can then use
Dirbuster!
We also know the pattern used by the web developer to name the images. Let us then
configure Dirbuster as follow:
The above Dirbuster configuration will try to fuzz all the images contained in the gallery
folder. Therefore, it will try to access URL such as
• /gallery/1.jpg
• /gallery/1.png
• /gallery/1.gif
• /gallery/2.jpg
• /gallery/2.png
• /gallery/2.gif
and so on.
From here, we can see that there are three other images not linked in the web application.
It is time to open them and verify their content!