Recon

Apache web page port did not really offer anything so i initially wanted to carry out a feroxbuster scan. This was not successfully no matter how many times I updated and upgraded the machine, it could not locate feroxbuster. Maybe next time.

Where the webpage and ports lead to

Gobuster for directory traversal

The only directory that offered anything useful was console as shown below

I tried the basic admin admin with no success. So i looked at the page source (CTRL + U)

Within the view source console/index.php there is javascript code "function handleSubmit() ["at the top, its javascript code so its going to run client side within web browser. The function is a handle submit for when the form is submitted and it runs the afore mentioned function. Scrolling near to the end of the obsufcated code, I managed to find a weird string. It said

Once i typed in javascript deobfuscator (lelinhtinh.github.io/de4js/) and copied the string into it and selected the option "packer". I was able to read it more clearly. It alluded to trying webpages ending in "phps" instead of just "php".

Last updated