image.png

Recon

simple network map scan:

nmap -sS -sV -T5 192.168.0.153 -p-

image.png

Notes:

Adding the misstep.nyx to /etc/hosts

image.png

Starting with a simple Fuzzing on the target :

feroxbuster -u <http://misstep.nyx> 
-w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt  
--filter-status 404 --scan-dir-listings 

image.png

After a simple Fuzzing we found a /admin with 403 Forbidden status code :

curl <http://misstep.nyx/admin>                                                                                           
Forbidden