OSINT
How difficult did you find this challenge?
As a security researcher, you received a hint that sensitive data, like administrator pass, is being exposed over the internet from a restaurant’s website. Sadly, the message has been damaged, only a picture could be recovered(Map.gif). Use OSINT tools and tactics to find which website it was and see if you can truly find the possible administrator password and notify the owner of the website. Warning! This is a drill with live, operational environment. Only passive reconnaissance is allowed, no active scanning or brute forcing shall be applied. All legal consequences of breaking this rule is the responsibility of those conducting it
Task 1: What is the originating website?
Task 2: What is the possible administrator password?
Task 3: How is it possible to obtain information from OSINT methods?
Task 4: What are the google dorks to be used to uncover relevant information?
Task 5: Can you use the obtained password to further investigate the problem?
Task 6: Where is the administrator password located? (In the _vti_private folder, service.pwd file)
Task 7: What functionality allows the attacker to simply uncover the administrator password?
Task 8: How could you possibly remediate this issue?