314 words
2 minutes
TakeOver TryHackMe WriteUP

Today, we have another challenge called Takeover.

In this room, we’ll start solving the challenge step by step while learning new techniques along the way, as usual.

The goal is not just to finish the room, but to understand the mindset and methods behind each step

First, we add the hostname futurevera.thm to our DNS file using the target machine’s IP address.
This step is required to access the website correctly

sudo nano /etc/hosts

Press enter or click to view image in full size

After adding it to our DNS, we proceed to visit the website.

Press enter or click to view image in full size

The challenge mentions that the support section is still under construction.
Because this room focuses on subdomain takeover, this is likely a hint that we should start fuzzing for subdomains and checking DNS records.

┌──(cat.0x01㉿kali)-[~]
└─$ ffuf -H "Host: FUZZ.futurevera.thm" -u https://10.82.168.37 -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-110000.txt -fs 0,4605

Press enter or click to view image in full size

We found two subdomains, blog and support, and added them to our `/etc/hosts file

Press enter or click to view image in full size

Next, let’s browse these subdomains and see how they behave

blog.futurevera.thm

Press enter or click to view image in full size

support.futurevera.thm

Press enter or click to view image in full size

After accessing the website over HTTP, we remove the certificate exception so the browser prompts us to accept it again.

Press enter or click to view image in full size

Next, we click on “View Certificate”.

Press enter or click to view image in full size

Inside the certificate, we found a support-related subdomain : support.futurevera.thm

After discovering it, we add the subdomain to our DNS configuration so we can access it properly

Press enter or click to view image in full size

Let’s open it and see how it responds.

Press enter or click to view image in full size

And just like that, we got the flag
I hope you found this challenge enjoyable and informative.
See you in the next TryHackMe room

X : https://x.com/cat0x01
github : http://github.com/cat0x01