🔬Win Workflow Platform - MSF

Lab 1

🔬 Windows: Workflow Platform

  • Target IP: 10.2.27.1

  • Exploit a vulnerable ProcessMaker server with Metasploit

nmap -sS -sV 10.2.27.1
80/tcp    open  http               Apache httpd 2.2.23 ((Win32) PHP/5.2.14)
135/tcp   open  msrpc              Microsoft Windows RPC
139/tcp   open  netbios-ssn        Microsoft Windows netbios-ssn
445/tcp   open  microsoft-ds       Microsoft Windows Server 2008 R2 - 2012 microsoft-ds
3306/tcp  open  mysql              MySQL (unauthorized)
3389/tcp  open  ssl/ms-wbt-server?
49152/tcp open  msrpc              Microsoft Windows RPC
49153/tcp open  msrpc              Microsoft Windows RPC
49154/tcp open  msrpc              Microsoft Windows RPC
49155/tcp open  msrpc              Microsoft Windows RPC
49156/tcp open  msrpc              Microsoft Windows RPC
Service Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windows

Enumeration

  • Explore the web application hosted on the web server, before running any vuln scanners

  • View the web page source code. In this case no version information can be found.

  • Search online for ProcessMaker default credentials

    • admin:admin

ProcessMaker v. 2.5.0

Exploitation

Metasploit - exploit/multi/http/processmaker_exec
Reveal Flag: 🚩

a3dcb4d229de6fde0db5686dee47145d


Last updated

Was this helpful?