Attacker (Kali): 10.10.14.145
Target: 10.10.11.97
0) Workspace & Tooling
Clean host mapping so tools can use the vhost
echo "10.10.11.97 gavel.htb" | sudo tee -a /etc/hosts
Tools used (deb)
sudo apt update
sudo apt install -y nmap ffuf git netcat-traditional john jq curl \
python3-pip
Python libs
pip install git-dumper requests bs4
1) Recon → Attack Surface
1.1 Port sweep & service enumeration
nmap -p- -sC -sV -oN nmap_full.txt 10.10.11.97
Expect:
22/tcp SSH (OpenSSH)
80/tcp HTTP (PHP app)
1.2 Web content discovery
ffuf -w /usr/share/seclists/Discovery/Web-Content/common.txt \
-u http://gavel.htb/FUZZ -e .php -o ffuf_gavel.json -of json
Highlights:
/admin.php - admin dashboard (auth)
/inventory.php - inventory (user view)
/.git/ - exposed VCS repo

