http-enum
GENERATED WORDS: 4612
---- Scanning URL: http://10.4.16.17/ ---- ==> DIRECTORY: http://10.4.16.17/app_themes/ ==> DIRECTORY: http://10.4.16.17/aspnet_client/ ==> DIRECTORY: http://10.4.16.17/configuration/ ==> DIRECTORY: http://10.4.16.17/content/ ==> DIRECTORY: http://10.4.16.17/Content/ ==> DIRECTORY: http://10.4.16.17/downloads/ ==> DIRECTORY: http://10.4.16.17/Downloads/ ==> DIRECTORY: http://10.4.16.17/resources/ ==> DIRECTORY: http://10.4.16.17/Resources/
---- Entering directory: http://10.4.16.17/app_themes/ ---- ==> DIRECTORY: http://10.4.16.17/app_themes/default/ ==> DIRECTORY: http://10.4.16.17/app_themes/Default/
---- Entering directory: http://10.4.16.17/aspnet_client/ ---- ==> DIRECTORY: http://10.4.16.17/aspnet_client/system_web/ [...] ---- Entering directory: http://10.4.16.17/resources/ ---- ==> DIRECTORY: http://10.4.16.17/resources/images/ ==> DIRECTORY: http://10.4.16.17/resources/Images/
---- Entering directory: http://10.4.16.17/Resources/ ---- ==> DIRECTORY: http://10.4.16.17/Resources/images/ ==> DIRECTORY: http://10.4.16.17/Resources/Images/
---- Entering directory: http://10.4.16.17/app_themes/default/ ---- ==> DIRECTORY: http://10.4.16.17/app_themes/default/images/ ==> DIRECTORY: http://10.4.16.17/app_themes/default/Images/
---- Entering directory: http://10.4.16.17/app_themes/Default/ ---- ==> DIRECTORY: http://10.4.16.17/app_themes/Default/images/ ==> DIRECTORY: http://10.4.16.17/app_themes/Default/Images/ [...]
browsh — A fully interactive, real-time, and modern text-based browser rendered to TTYs and browsers. It's used when only command line is available or no browser is installed.
Copy
browsh --startup-url http://10.4.16.17/Default.aspxNote: The target application is WebGoat.net
Lab 2
🔬 Windows Recon: IIS: Nmap Scripts
Target IP:
10.4.21.207Enumeration of an
IISHTTP server usingnmapscripts
Use the nmap http-enum script to discover and enumerate web server directories.
nmap 10.4.21.207
PORT STATE SERVICE
80/tcp open http
135/tcp open msrpc
139/tcp open netbios-ssn
445/tcp open microsoft-ds
3306/tcp open mysql
3389/tcp open ms-wbt-serverOutput:
Potentially interesting folders are content, downloads, webdav.
Use the nmap http-headers script to display the HTTP headers:
Output:
Notes:
IIS Server version is
10.0ASP.NET version is
4.0.30319XSS Protection is off (
0)Default page of the target web app is
/Default.aspx
Use the nmap http-methods script to find supported options/methods:
Output:
Enumerated supported HTTP methods are OPTIONS, TRACE, GET, HEAD, POST, COPY, PROPFIND, DELETE, MOVE, PROPPATCH, MKCOL, LOCK, UNLOCK, PUT.
Use the nmap http-webdav-scan script to enumerate WebDAV installation:
Output:
Lab 3
🔬 Apache Recon: Dictionary Attack
Target IP:
192.199.232.3Enumeration of an
ApacheHTTP server
Output:
Running web server version is Apache httpd 2.4.18.
Note: Apache2 Ubuntu Default page is hosted on the running web server.
Perform directories brute-force using the metasploit auxiliary scanner brute_dirs. Use robots_txt module to detect robots.txt files and analyze its content too.
Output:
dir, poc directories found.
Output:
curl — command line tool and library for transferring data with URLs
Output:
Output:
Note: The /dir directory is using Basic auth protection — see the WWW-Authenticate header.
Output:
Use the metasploit http_header module to identify the /poc directory protection:
Output:
Note: The /poc directory is using Digest auth protection.
Use the metasploit http_login module to attempt HTTP user authentication.
Create a user file:
Output:
The /dir directory credentials are bob:qwerty.
Reveal Flag — dir directory flag is:
Next, attempt authentication for /poc:
Output:
The /poc directory credentials are alice:password1.
Reveal Flag — poc directory flag is:
Lab 4
🔬 Apache Recon: Basics
Target IP:
192.157.222.3Enumeration of an
ApacheHTTP server
Output:
Running web server version is Apache httpd 2.4.18.
lynx — a text web browser
Directory brute-force with dirb:
Output snippet:
Metasploit modules:
Reveal Flag — robots.txt content:
Last updated 3 hours ago
Last updated