Content Discovery-Writeup | TryHackMe [Task: 1–6]

Madushan perera
3 min readJan 18, 2023

--

Learn the various ways of discovering hidden or private content on a web server that could lead to new vulnerabilities.

Link: https://tryhackme.com/room/contentdiscovery

Task 1: What Is Content Discovery?

What is the content discovery method that begins with M?

Answer: Manually

What is the content discovery method that begins with A?

Answer: Automated

What is the content discovery method that begins with O?

Answer: OSINT

Task 2: Manual Discovery — Robots.txt

What is the directory in the robots.txt that isn’t allowed to be viewed by web crawlers?

Answer: /staff-portal

Task 3: Manual Discovery — Favicon

What framework did the favicon belong to?

Answer: cgiirc

Command to get the hash value of the favicon:

curl https://static-labs.tryhackme.cloud/sites/favicon/images/favicon.ico | md5sum

Get the correct hash, and then check the mentioned website for the framework related to the relevant hash value.

Get the correct hash, and then check the mentioned website for the framework related to the relevant hash value.

Task 4: Manual Discovery — Sitemap.xml

What is the path of the secret area that can be found in the sitemap.xml file?

Answer: /s3cr3t-area

Task 5: Manual Discovery — HTTP Headers

What is the flag value from the X-FLAG header?

Answer: THM{HEADER_FLAG}

Task 6: Manual Discovery — Framework Stack

What is the flag from the framework’s administration portal?

Answer: THM{CHANGE_DEFAULT_CREDENTIALS}

To be Continued…

--

--

Madushan perera
Madushan perera

Written by Madushan perera

Cloud Security Enthusiast | Research Writer

No responses yet