recon_06 (vhost)
Last updated
Last updated
View the exercise here: PentesterLab: Recon 06
For this challenge, your goal is to access the default virtual host ("vhost").
When accessing a new webserver, it often pays off to replace the hostname with the IP address or to provide a random Host header in the request. To do this, you can either modify the request in a web proxy or use:
Do DNS resolution to get IP.
dig
(Domain Information Groper) is used to query DNS servers. This command will return details such as the A record (the IP address of hackycorp.com
), which you’ll use in later steps.
Connect the client to the IP address:
The command makes a request to the IP address and shows you the entire process, including the HTTP headers and the response from the server. This helps you see how the server reacts, providing information that could lead to finding the key or solution for the challenge.
Access the IP on a browser to get the flag.