http-enum

GENERATED WORDS: 4612

---- Scanning URL: http://10.4.16.17/ ---- ==> DIRECTORY: http://10.4.16.17/app_themes/ ==> DIRECTORY: http://10.4.16.17/aspnet_client/ ==> DIRECTORY: http://10.4.16.17/configuration/ ==> DIRECTORY: http://10.4.16.17/content/ ==> DIRECTORY: http://10.4.16.17/Content/ ==> DIRECTORY: http://10.4.16.17/downloads/ ==> DIRECTORY: http://10.4.16.17/Downloads/ ==> DIRECTORY: http://10.4.16.17/resources/ ==> DIRECTORY: http://10.4.16.17/Resources/

---- Entering directory: http://10.4.16.17/app_themes/ ---- ==> DIRECTORY: http://10.4.16.17/app_themes/default/ ==> DIRECTORY: http://10.4.16.17/app_themes/Default/

---- Entering directory: http://10.4.16.17/aspnet_client/ ---- ==> DIRECTORY: http://10.4.16.17/aspnet_client/system_web/ [...] ---- Entering directory: http://10.4.16.17/resources/ ---- ==> DIRECTORY: http://10.4.16.17/resources/images/ ==> DIRECTORY: http://10.4.16.17/resources/Images/

---- Entering directory: http://10.4.16.17/Resources/ ---- ==> DIRECTORY: http://10.4.16.17/Resources/images/ ==> DIRECTORY: http://10.4.16.17/Resources/Images/

---- Entering directory: http://10.4.16.17/app_themes/default/ ---- ==> DIRECTORY: http://10.4.16.17/app_themes/default/images/ ==> DIRECTORY: http://10.4.16.17/app_themes/default/Images/

---- Entering directory: http://10.4.16.17/app_themes/Default/ ---- ==> DIRECTORY: http://10.4.16.17/app_themes/Default/images/ ==> DIRECTORY: http://10.4.16.17/app_themes/Default/Images/ [...]

browsh — A fully interactive, real-time, and modern text-based browser rendered to TTYs and browsers. It's used when only command line is available or no browser is installed.

Copy

browsh --startup-url http://10.4.16.17/Default.aspx

Note: The target application is WebGoat.net


Lab 2

🔬 Windows Recon: IIS: Nmap Scripts

  • Target IP: 10.4.21.207

  • Enumeration of an IIS HTTP server using nmap scripts

Use the nmap http-enum script to discover and enumerate web server directories.

nmap 10.4.21.207
    PORT     STATE SERVICE
    80/tcp   open  http
    135/tcp  open  msrpc
    139/tcp  open  netbios-ssn
    445/tcp  open  microsoft-ds
    3306/tcp open  mysql
    3389/tcp open  ms-wbt-server

Output:

Potentially interesting folders are content, downloads, webdav.

Use the nmap http-headers script to display the HTTP headers:

Output:

Notes:

  • IIS Server version is 10.0

  • ASP.NET version is 4.0.30319

  • XSS Protection is off (0)

  • Default page of the target web app is /Default.aspx

Use the nmap http-methods script to find supported options/methods:

Output:

Enumerated supported HTTP methods are OPTIONS, TRACE, GET, HEAD, POST, COPY, PROPFIND, DELETE, MOVE, PROPPATCH, MKCOL, LOCK, UNLOCK, PUT.

Use the nmap http-webdav-scan script to enumerate WebDAV installation:

Output:


Lab 3

🔬 Apache Recon: Dictionary Attack

  • Target IP: 192.199.232.3

  • Enumeration of an Apache HTTP server

Output:

Running web server version is Apache httpd 2.4.18.

Note: Apache2 Ubuntu Default page is hosted on the running web server.

Perform directories brute-force using the metasploit auxiliary scanner brute_dirs. Use robots_txt module to detect robots.txt files and analyze its content too.

Output:

dir, poc directories found.

Output:

curl — command line tool and library for transferring data with URLs

Output:

Output:

Note: The /dir directory is using Basic auth protection — see the WWW-Authenticate header.

Output:

Use the metasploit http_header module to identify the /poc directory protection:

Output:

Note: The /poc directory is using Digest auth protection.

Use the metasploit http_login module to attempt HTTP user authentication.

Create a user file:

Output:

The /dir directory credentials are bob:qwerty.

Reveal Flag — dir directory flag is:

chevron-rightdir directory flaghashtag

72af1d9471cfea41ac0ff3600b3702f6

Next, attempt authentication for /poc:

Output:

The /poc directory credentials are alice:password1.

Reveal Flag — poc directory flag is:

chevron-rightpoc directory flaghashtag

0b6f98199bae51afc2f60578f923f8af


Lab 4

🔬 Apache Recon: Basics

  • Target IP: 192.157.222.3

  • Enumeration of an Apache HTTP server

Output:

Running web server version is Apache httpd 2.4.18.

lynx — a text web browser

Directory brute-force with dirb:

Output snippet:

Metasploit modules:

Reveal Flag — robots.txt content:

chevron-rightrobots.txt content (flag)hashtag

BadBot


Last updated 3 hours ago

Last updated