Vulnhub SP: eric Walkthrough
- by Vince
-
in Blog
-
Hits: 3473
SP: eric is one of the newer releases from Vulnhub and when I first started enumerating it, I spotted the .git directory. Right off the bat, I figured that wasn't there by accident and I started Googling to find more information. After a minute or so, I discovered a post titled: "Don't publicly expose .git or how we downloaded your website's sourcecode" which lead me to a collection of tools written that facilitate data from sites where .git is exposed.
While I was working through this box, I was reminded of a Defcon talk, "Hacking Git", which I believe is along the same lines. A quick search found some tools related from that talk but I wasn't as successful at extracting data as I was with the tools above so as far as I can tell, this is the quickest path to get where you need.
Anyway, I kick off with an Nmap scan: