githubEdit

🔬HTTP Enum

HTTP (Hyper Text Transfer Protocol) - a client-server application layer protocol, used to load web pages using hypertext links.

A client machine makes a request to a server (usually from a website), which then sends a response message back to the client.

Default HTTP port is 80 and HTTPS port is 443.

sudo nmap -p80 -sV -O <TARGET_IP>

Lab 1

🔬 Windows Recon: IISarrow-up-right

  • Target IP: 10.4.16.17

  • Enumeration of an IIS HTTP server, without the usage of a browser

nmap 10.4.16.17
	80/tcp   open  http
	135/tcp  open  msrpc
	139/tcp  open  netbios-ssn
	445/tcp  open  microsoft-ds
	3306/tcp open  mysql
	3389/tcp open  ms-wbt-server
nmap -sV -O 10.4.16.17
	80/tcp   open  http          Microsoft IIS httpd 10.0
	135/tcp  open  msrpc         Microsoft Windows RPC
	139/tcp  open  netbios-ssn   Microsoft Windows netbios-ssn
	445/tcp  open  microsoft-ds?
	3306/tcp open  mysql         MySQL (unauthorized)
	3389/tcp open  ms-wbt-server Microsoft Terminal Services
	No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
	TCP/IP fingerprint:
	OS:SCAN(V=7.91%E=4%D=2/16%OT=80%CT=1%CU=40432%PV=Y%DS=3%DC=I%G=Y%TM=63EE45E
	OS:B%P=x86_64-pc-linux-gnu)SEQ(SP=102%GCD=1%ISR=10B%TI=I%CI=I%II=I%SS=S%TS=
	OS:U)OPS(O1=M546NW8NNS%O2=M546NW8NNS%O3=M546NW8%O4=M546NW8NNS%O5=M546NW8NNS
	OS:%O6=M546NNS)WIN(W1=FFFF%W2=FFFF%W3=FFFF%W4=FFFF%W5=FFFF%W6=FF70)ECN(R=Y%
	OS:DF=Y%T=7F%W=FFFF%O=M546NW8NNS%CC=Y%Q=)T1(R=Y%DF=Y%T=7F%S=O%A=S+%F=AS%RD=
	OS:0%Q=)T2(R=Y%DF=Y%T=7F%W=0%S=Z%A=S%F=AR%O=%RD=0%Q=)T3(R=Y%DF=Y%T=7F%W=0%S
	OS:=Z%A=O%F=AR%O=%RD=0%Q=)T4(R=Y%DF=Y%T=7F%W=0%S=A%A=O%F=R%O=%RD=0%Q=)T5(R=
	OS:Y%DF=Y%T=7F%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=7F%W=0%S=A%A=O%F=
	OS:R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=7F%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R=Y%DF=N%T
	OS:=7F%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=7F%CD=
	OS:Z)
	
	Network Distance: 3 hops
	Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

📌

  • IIS Server version is 10.0

  • ASP.NET version is 4.0.30319

  • XSS Protection is off(0)

  • Default page of the target web app is /Default.aspx

httpie - CLI, cURL-like tool for humans. Run with http

dirbarrow-up-right - a Web content scanner. It launches a dictionary based attack against a web server, looking for existing Web Objects and analyzing the response. It comes with a set of preconfigured attack wordlists.

  • Try to browse to the found directories to find out if access is granted

dirb

browsh - A fully interactive, real-time, and modern text-based browser rendered to TTYs and browsers. It's used when only command line is available or now browser is installed.

browsh
firefox

📌 The target application is WebGoat.net

Lab 2

🔬 Windows Recon: IIS: Nmap Scriptsarrow-up-right

  • Target IP: 10.4.21.207

  • Enumeration of an IIS HTTP server using nmap scripts

nmap http-enum

📌 Potentially interesting folders are content, downloads, webdav.

nmap http-headers

📌

  • IIS Server version is 10.0

  • ASP.NET version is 4.0.30319

  • XSS Protection is off(0)

  • Default page of the target web app is /Default.aspx

nmap http-methods

📌 Enumerated supported HTTP methods are OPTIONS, TRACE, GET, HEAD, POST, COPY, PROPFIND, DELETE, MOVE, PROPPATCH, MKCOL, LOCK, UNLOCK, PUT

Lab 3

🔬 Apache Recon: Dictionary Attackarrow-up-right

  • Target IP: 192.199.232.3

  • Enumeration of an Apache HTTP server

📌 Running web server version is Apache httpd 2.4.18

curl
browsh

📌 Apache2 Ubuntu Default page is hosted on the running web server.

Metasploit - brute_dirs

📌 dir, poc directories found.

curl - command line tool and librare for transferring data with URLs

curl dir

📌 dir directory is using Basic auth protection - WWW-Authenticate headerarrow-up-right

curl poc

📌 poc directory is using Difest auth protection

📌 dir directory credentials are bob:qwerty

chevron-rightReveal Flag - dir directory flag is: 🚩hashtag

72af1d9471cfea41ac0ff3600b3702f6

curl -u

📌 poc directory credentials are alice:password1

chevron-rightReveal Flag - poc directory flag is: 🚩hashtag

0b6f98199bae51afc2f60578f923f8af

curl --digest -u

Lab 4

🔬 Apache Recon: Basicsarrow-up-right

  • Target IP: 192.157.222.3

  • Enumeration of an Apache HTTP server

📌 Running web server version is Apache httpd 2.4.18

lynx - is a text web browser.

  • Metasploit modules

chevron-rightReveal Flag - poc directory flag is: 🚩hashtag

BadBot


Last updated