First of all, we add the machine to known hosts like:

sudo echo "10.10.33.146 airplane.thm" | sudo tee -a /etc/hosts

Then I performed an Nmap scan:

nmap -sC -T4 -p- airplane.thm > sC.txt
 
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-09 19:55 CEST
Nmap scan report for airplane.thm (10.10.33.146)
Host is up (0.052s latency).
Not shown: 65532 closed tcp ports (conn-refused)
PORT     STATE SERVICE
22/tcp   open  ssh
| ssh-hostkey: 
|   3072 b8:64:f7:a9:df:29:3a:b5:8a:58:ff:84:7c:1f:1a:b7 (RSA)
|   256 ad:61:3e:c7:10:32:aa:f1:f2:28:e2:de:cf:84:de:f0 (ECDSA)
|_  256 a9:d8:49:aa:ee:de:c4:48:32:e4:f1:9e:2a:8a:67:f0 (ED25519)
6048/tcp open  x11
8000/tcp open  http-alt
| http-title: About Airplanes
|_Requested resource was http://airplane.thm:8000/?page=index.html
 
Nmap done: 1 IP address (1 host up) scanned in 30.42 seconds

So I decided to take a look at http://airplane.thm:8000:

Once here, I decided to perform some enumeration using dirsearch ๐Ÿ“

dirsearch -u http://airplane.thm:8000 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
 
[REDACTED]
[20:05:39] Starting:                                                                                                
[20:07:00] 200 -  655B  - /airplane

Letโ€™s inspect /airplane directory:

Itโ€™s some kind of gif

So I decided to perform a deeper enumeration inside /airplane:

dirsearch -u http://airplane.thm:8000/airplane -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt

As I didnโ€™t found anything, I decided to take a look back into a โ€œpossibleโ€ lfi on the main page, so I started Burp and caught the request:

Found a lfi vulnerability