1000016677.jpg

Recon

simple network map scan:

nmap -sS -sV -T5 192.168.0.134

image.png

Notes:

As usual Since the port 80 is open, we started with a simple look on the browser:

image.png

The application seems like a simple Store, we can follow the recon with some Fuzzing to discover if there is any hidden routes, for that we will use feroxbuster:

feroxbuster -u <http://192.168.0.134/> 
-w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt 
--filter-status 404 --scan-dir-listings

image.png