root@rumais:~# inspect ignite

Ignite

Web-focused room covering application testing, content discovery, and common attack paths. This page combines the local notes, supporting artifacts, and a cleaned-up summary of the room path.

Room Details

Built from supporting notes and artifacts. This room is grouped under Web and App Security.

Web and App Security 1 docx note 2 command artifact

Summary

Ignite is generally a Fuel CMS exploitation room. The normal path is to confirm the vulnerable CMS version, exploit the known RCE issue, establish a shell, harvest local credentials or configuration values, and then escalate on the Linux host.

Fuel CMS fingerprinting known RCE path shell establishment credential harvesting Linux privesc

Notes

Recon

  • Ignite is best approached through structured enumeration rather than noisy exploitation.
  • The early workflow usually centers on Fuel CMS fingerprinting, known RCE path, which exposes the route into the room.

Initial Access

  • The intended foothold comes from following the attack path described in the room flow and validating the exposed service behavior.
  • In practice, this means converting the discovered clues into working access through Fuel CMS fingerprinting and adjacent enumeration findings.

Privilege Escalation

  • After the first foothold, the room shifts into post-exploitation and local review.
  • The key escalation themes are shell establishment, credential harvesting, which complete the move to the final proof material.

Security Notes

  • Ignite reinforces how small exposure points compound when enumeration is disciplined and service relationships are understood.
  • The defensive lesson is to reduce credential reuse, remove unnecessary trust paths, and harden secondary services before they become the pivot.

    Collected Output

nmap-full_port

# Nmap 7.91 scan initiated Thu Jun 24 21:47:51 2021 as: nmap -p- -oN nmap-full_port 10.10.57.118

nmap-initial

# Nmap 7.91 scan initiated Thu Jun 24 21:41:14 2021 as: nmap -sC -sV -oN nmap-initial 10.10.57.118
Nmap scan report for 10.10.57.118
Host is up (0.51s latency).
Not shown: 999 closed ports
PORT   STATE SERVICE VERSION
80/tcp open  http    Apache httpd 2.4.18 ((Ubuntu))
| http-robots.txt: 1 disallowed entry 
|_/fuel/
|_http-server-header: Apache/2.4.18 (Ubuntu)
|_http-title: Welcome to FUEL CMS

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Thu Jun 24 21:42:56 2021 -- 1 IP address (1 host up) scanned in 101.70 seconds