root@rumais:~# inspect ignite
Ignite
Web-focused room covering application testing, content discovery, and common attack paths. This page combines the local notes, supporting artifacts, and a cleaned-up summary of the room path.
Room Details
Built from supporting notes and artifacts. This room is grouped under Web and App Security.
Summary
Ignite is generally a Fuel CMS exploitation room. The normal path is to confirm the vulnerable CMS version, exploit the known RCE issue, establish a shell, harvest local credentials or configuration values, and then escalate on the Linux host.
Notes
Recon
- Ignite is best approached through structured enumeration rather than noisy exploitation.
- The early workflow usually centers on Fuel CMS fingerprinting, known RCE path, which exposes the route into the room.
Initial Access
- The intended foothold comes from following the attack path described in the room flow and validating the exposed service behavior.
- In practice, this means converting the discovered clues into working access through Fuel CMS fingerprinting and adjacent enumeration findings.
Privilege Escalation
- After the first foothold, the room shifts into post-exploitation and local review.
- The key escalation themes are shell establishment, credential harvesting, which complete the move to the final proof material.
Security Notes
- Ignite reinforces how small exposure points compound when enumeration is disciplined and service relationships are understood.
- The defensive lesson is to reduce credential reuse, remove unnecessary trust paths, and harden secondary services before they become the pivot.
Collected Output
nmap-full_port
# Nmap 7.91 scan initiated Thu Jun 24 21:47:51 2021 as: nmap -p- -oN nmap-full_port 10.10.57.118
nmap-initial
# Nmap 7.91 scan initiated Thu Jun 24 21:41:14 2021 as: nmap -sC -sV -oN nmap-initial 10.10.57.118
Nmap scan report for 10.10.57.118
Host is up (0.51s latency).
Not shown: 999 closed ports
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.4.18 ((Ubuntu))
| http-robots.txt: 1 disallowed entry
|_/fuel/
|_http-server-header: Apache/2.4.18 (Ubuntu)
|_http-title: Welcome to FUEL CMS
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Thu Jun 24 21:42:56 2021 -- 1 IP address (1 host up) scanned in 101.70 seconds