⚠️ Legal Disclaimer: This content is for educational purposes only. Always ensure you have proper authorization before testing

Preignition introduces web directory enumeration — the process of discovering hidden paths, admin panels, and files on a web server that aren't linked from the main site. The tools here are Gobuster (a fast directory brute-forcer) and SecLists (a curated collection of wordlists). Finding an exposed admin panel with default credentials is a classic and frequent web application finding.

Tools: nmap · gobuster · SecLists · curl  ·  Difficulty: Very Easy  ·  OS: Linux
01 — What You Will Learn
SkillWhy it matters
Web server fingerprinting with NmapIdentifying the web server type and version guides wordlist selection
Directory brute-forcing with GobusterFinding hidden content is a core web application recon skill
SecLists wordlistsThe most comprehensive public collection of wordlists for any enumeration scenario
Default admin credentialsAdmin panels left on defaults are an immediate critical web finding
02 — Reconnaissance
Nmap scan
nmap -sV -sC -p- --min-rate 5000 10.129.x.x
Relevant output
PORT STATE SERVICE VERSION 80/tcp open http nginx 1.14.2 |_http-title: Welcome to nginx!

What you're seeing: port 80 running nginx. The default nginx landing page title means no custom application is served at the root — but there may be content at subdirectories. This is exactly when directory enumeration is warranted.

ℹ  Always browse to the web application manually first. Look at the page source, check /robots.txt and /sitemap.xml before running any brute-force tools.
03 — Directory Enumeration with Gobuster

Gobuster's dir mode brute-forces paths against the target URL using a wordlist.

Install SecLists (if not present)
sudo apt install seclists
Run Gobuster
gobuster dir \ -u http://10.129.x.x \ -w /usr/share/seclists/Discovery/Web-Content/common.txt \ -x php,html \ -t 50
Output
=============================================================== Gobuster v3.x =============================================================== /admin.php (Status: 200) [Size: 999]

What you're seeing: /admin.php returns HTTP 200 — an accessible admin panel. Any 200 response is worth investigating immediately.

Gobuster flagMeaning
dirDirectory / file enumeration mode
-u <url>Target URL
-w <wordlist>Path to wordlist
-x <ext>File extensions to append to each word (php, html, txt…)
-t <n>Number of concurrent threads (default 10)
-b <codes>Blacklist status codes to ignore (e.g. 404,403)
-o <file>Save output to a file
--no-errorSuppress connection errors from output
04 — Exploitation

Navigate to http://10.129.x.x/admin.php in your browser. You're presented with a login form. Try the most common default credentials before any brute-force.

Default credentials to try first
UsernamePassword
adminadmin
adminpassword
admin123456
administratoradministrator
rootroot

admin / admin works. You're logged in — and the flag is displayed on the dashboard.

✓ Submit the flag string to complete the machine.
⚠  Default credentials on admin panels are a critical web application finding (OWASP A07:2021 — Identification and Authentication Failures). Always test defaults manually before running any credential brute-force tool.
05 — SecLists Wordlist Reference
Wordlist pathBest used for
/Discovery/Web-Content/common.txtGeneral directory and file discovery — good first choice
/Discovery/Web-Content/directory-list-2.3-medium.txtDeeper directory discovery — larger, slower
/Discovery/Web-Content/raft-large-files.txtFile-focused enumeration
/Passwords/Default-Credentials/default-passwords.csvDefault credential pairs for services and applications
/Usernames/Names/names.txtUsername enumeration
/Fuzzing/LFI/LFI-Jhaddix.txtLocal File Inclusion path fuzzing
06 — Key Takeaways
An nginx default page at the root doesn't mean the server is empty. Directory enumeration is essential on every web target — the interesting content is almost never at /.
ConceptReal-world relevance
Forced browsingWeb crawlers only follow links — brute-forcing finds content that's deployed but intentionally unlisted
-x php,html mattersMany admin panels are .php files — always append relevant extensions for the target stack
Default creds = instant criticalNever skip manual default-credential testing before reaching for Hydra or Burp Intruder
SecLists is your best friendIt covers directories, credentials, subdomains, fuzzing payloads, and more — install it on every pentest box