`

exist in directory indexing pages. You can verify this by viewing the

source HTML page at http://172.16.10.11/backup.

If we find either string, we call the wget command 4 with the

quiet option (-q) to silence verbose output, the recursive option (-r)

to download files recursively from folders, the no-parent option (-

np) to ensure we download only files at the same level of hierarchy

or below (subfolders), and the reject option (-R) to exclude files

starting with the word index.html. We then use the target folder

option (-P) to download the content to the path specified by the user

calling the script (OUTPUT_FOLDER variable). If the user did not

provide a destination folder, the script will default to use the data

folder set at 5.

The acme-impact-alliance folder appears to be empty. But is it

really? When dealing with web servers, you may run into what seem

to be dead ends only to find out that there is something hiding there,

just not in a very obvious place. Take note of the empty folder for

now; well resume this exploration in a little bit.

Identifying Suspicious robots.txt Entries

Continue to the third IP address and explore the results from

Nikto:

+ Server: Apache/2.4.54 (Debian)

+ Retrieved x-powered-by header: PHP/8.0.28

--snip--

+ Uncommon header 'link' found, with contents: <http://172.16.10.12/wp-json/>; rel="https://api.w.org/"

--snip--

+ Entry '/wp-admin/' in robots.txt returned a non-forbidden or redirect HTTP code (302)

+ Entry '/donate.php' in robots.txt returned a non-forbidden or redirect HTTP code (200)

+ "robots.txt" contains 17 entries which should be manually viewed.

+ /wp-login.php: Wordpress login found

--snip--

Nikto was able to find a lot more information this time! Other

than the missing security headers (which is extremely common to

see in the wild, unfortunately) it also found that the server is running

on Apache (Debian), and that it is powered by PHP, a backend

programming language commonly used in web applications.

The tool also found an uncommon link that points to

http://172.16.10.12/wp-json and two suspicious entries in the

robots.txt file, namely /wp-admin/ and /donate.php. The robots.txt

file is a special file used to indicate to web crawlers (such as

Black Hat Bash (Early Access) © 2023 by Dolev Farhi and Nick Aleks