15.10.2025

> [CTF][HTB][#2] – Web Enumeration

In this post I’ll describe how I solved a web enumeration CTF challenge. I used several basic scanning and web-application analysis techniques to ultimately retrieve the flag.

1. Basic server reconnaissance

I started with a simple inspection of the HTTP headers using curl:

curl -IL 94.237.63.90:59417

This allowed me to check basic server information and any redirects. Nothing noteworthy stood out at this stage.

2. Directory enumeration — Gobuster

Next, I ran directory enumeration with Gobuster to discover accessible paths on the host.

The scan revealed an interesting path:

/wordpress (Status: 301)

This suggested the server was running WordPress or a similar CMS.

3. Checking robots.txt

I then checked robots.txt, which often contains hints about site structure or hidden areas:

http://94.237.63.90:59417/robots.txt

That immediately caught my attention — it pointed to a hidden admin login page.

4. Finding credentials in the page source

I opened http://94.237.63.90:59417/admin-login-page.php and inspected the HTML source in the browser developer tools. I found login credentials embedded in the page source.

Using those credentials, I logged into the administrative panel.

5. Retrieving the flag

Inside the admin panel I located the CTF flag and completed the challenge successfully.


Summary / Takeaway

This challenge highlights the importance of properly configuring web applications and not exposing sensitive information in client-side code or public files (like robots.txt). Proper hardening and secure handling of credentials are essential — both for real applications and when preparing CTF challenges. See you in the next CTF! 🚀