Write-up

Step-by-step guide on the approach taken to pwn the machine.

Objectives

  • Enumerate subdomains to identify possible security misconfigurations.

  • Analyze SSL certificates to discover additional subdomains.

  • Access exposed sensitive resources and retrieve the flag.


Reconnaissance

First, we added futurevera.thm to the /etc/hosts file to resolve the domain locally. Next, we performed a fast and aggressive port scan using:

sudo nmap -sCV -Pn -T5 -F <IP_VICTIM>

The results showed three open ports:

  • 22/tcp (SSH)

  • 80/tcp (HTTP - redirecting to HTTPS)

  • 443/tcp (HTTPS)

Given the challenge description mentioning a rebuilding support system, we guessed a potential subdomain: support.futurevera.thm. We manually added it to /etc/hosts and attempted to access it via browser.

Upon accessing https://support.futurevera.thm, the site loaded successfully but did not immediately reveal sensitive information.

At this point, we inspected the SSL certificate used by the web server. By examining the Subject Alternative Names (SAN) section of the certificate, we identified an additional subdomain that was not initially mentioned: https://secret******-support.futurevera.thm

We then added this newly discovered subdomain to /etc/hosts and navigated to it via the browser.

Accessing https://secret******-support.futurevera.thm directly led us to a page displaying the flag, successfully completing the challenge.

Last updated