Apache Recon: Basics
The Apache HTTP Server, commonly known as Apache, is a free and open-source web server software that powers a significant portion of the internet. It's renowned for its reliability, robustness, and flexibility, making it one of the most popular choices for hosting websites. In this lab, we will look at the basics of Apache server reconnaissance.
Task:
Lab Environment
In this lab environment, you will be provided with GUI access to a Kali machine. The target machine will be accessible at demo.ine.local.
Objective: Answer the following questions:
Which web server software is running on the target server and also find out the version using nmap.
Which web server software is running on the target server and also find out the version using suitable metasploit module.
Check what web app is hosted on the web server using curl command.
Check what web app is hosted on the web server using wget command.
Check what web app is hosted on the web server using browsh CLI based browser.
Check what web app is hosted on the web server using lynx CLI based browser.
Perform bruteforce on webserver directories and list the names of directories found. Use brute_dirs metasploit module.
Use the directory buster (dirb) with "/usr/share/metasploit-framework/data/wordlists/directory.txt" dictionary to check if any directory is present in the root folder of the web server. List the names of found directories.
Which bot is specifically banned from accessing a specific directory?
Tools
The best tools for this lab are:
Nmap
Metasploit Framework
browsh
lynx
dirb
curl
wget
Solutions:
Step 1: Open the lab link to access the Kali machine.

Step 2: Check if the target machine is reachable:
Command:

The target is reachable.
Step 3: Check which web server software is running on the target server and also find out the version using nmap.
Command:

Apache 2.4.18 is running on the target machine.
Step 4: Which web server software is running on the target server and also find out the version using suitable metasploit module.
Command:

Apache 2.4.18 is running on the target machine.
Step 5: Check what web app is hosted on the web server using curl command.
Command:

It is the Apache default page.
Step 6: Check what web app is hosted on the web server using wget command.
Command:

It is the Apache default page.
Step 7: Check what web app is hosted on the web server using browsh CLI based browser.
Command:

It is the Apache default page.
Step 8: Check what web app is hosted on the web server using lynx CLI based browser.
Command:

It is the Apache default page.
Step 9: Perform bruteforce on webserver directories and list the names of directories found. Use brute_dirs metasploit module.
Command:

The names of the directories found are dir and src.
Step 10: Use the directory buster (dirb) with "/usr/share/metasploit-framework/data/wordlists/directory.txt" dictionary to check if any directory is present in the root folder of the web server. List the names of found directories.
Command:

We found two directories named data and dir.
Step 11: Check which bot is specifically banned from accessing a specific directory?
Command:

The answer is BadBot.
Conclusion
In this lab, we looked at the basics of Apache server reconnaissance.
References
Last updated