TryHackMe | Content Discovery Walkthrough


Learn the various ways of discovering hidden or private content on a webserver that could lead to new vulnerabilities.

Link- https://tryhackme.com/room/contentdiscovery


What is the Content Discovery method that begins with M?

Manually

What is the Content Discovery method that begins with A?

Automated

What is the Content Discovery method that begins with O?

OSINT

What is the directory in the robots.txt that isn’t allowed to be viewed by web crawlers?

Check the robots.txt file

/staff-portal

What framework did the favicon belong to?

Download the file and upload to virustotal to get hash and then check the mentioned website for the hash.

cgiirc


What is the path of the secret area that can be found in the sitemap.xml file?

Check the sitemap

/s3cr3t-area


What is the flag value from the X-FLAG header?

Run the curl command


What is the flag from the framework’s administration portal?

Go to mentioned website and find the location /thm-framework-login and login with username and password “admin” 


What Google dork operator can be used to only show results from a particular site?

site:

What online tool can be used to identify what technologies a website is running?

Wappalyzer

What is the website address for the Wayback Machine?

https://archive.org/web

What is Git?

version control system

What URL format do Amazon S3 buckets end in?

.s3.amazonaws.com

What is the name of the directory beginning “/mo….” that was discovered?

Run Gobuster

/monthly


What is the name of the log file that was discovered?

/development.log


That’s it. See you in the next room :)


Comments

Eonrec

Popular posts from this blog

TryHackMe | Introduction To Honeypots Walkthrough

TryHackMe | DFIR: An Introduction WriteUp

TryHackMe | Intro to Cyber Threat Intel WriteUp