Web
Nmap discovered a Web server on the target port 443
The running service is Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
While browsing via the IPv4 address returns a 404, providing the FQDN returns a web application that appears to be designed for professional medical training
Wappalyzer reveals web technologies involved
It’s hosted with WordPress and IIS
It also appears to use MySQL as a backend DB
wpscan
┌──(kali㉿kali)-[~/archive/htb/labs/acute]
└─$ wpscan --url https://atsserver.acute.local --server iis --force --disable-tls-checks --wp-content-dir / -e u
[+] URL: https://atsserver.acute.local/ [10.10.11.145]
[+] Started: Tue Nov 7 14:03:04 2023
Interesting Finding(s):
[+] Headers
| Interesting Entries:
| - server: Microsoft-IIS/10.0
| - x-powered-by: ASP.NET
| Found By: Headers (Passive Detection)
| Confidence: 100%
Fingerprinting the version - Time: 00:00:27 <===================================================> (700 / 700) 100.00% Time: 00:00:27
[+] WordPress version 5.8.2 identified (Insecure, released on 2021-11-10).
| Found By: Emoji Settings (Passive Detection)
| - https://atsserver.acute.local/, Match: 'wp-includes\/js\/wp-emoji-release.min.js?ver=5.8.2'
[i] The main theme could not be detected.
[+] Enumerating Users (via Passive and Aggressive Methods)
Brute Forcing Author IDs - Time: 00:00:04 <======================================================> (10 / 10) 100.00% Time: 00:00:04
[i] No Users Found.
[!] No WPScan API Token given, as a result vulnerability data has not been output.
[!] You can get a free API token with 25 daily requests by registering at https://wpscan.com/register
[+] Finished: Tue Nov 7 14:03:39 2023
[+] Requests Done: 727
[+] Cached Requests: 49
[+] Data Sent: 172.208 KB
[+] Data Received: 1.093 MB
[+] Memory used: 158.586 MB
[+] Elapsed time: 00:00:35
While wpscan found the version information, WordPress version 5.8.2
, user data doesn’t seem to be available for enumeration
Burp Suite’s Passive Crawler
Additionally, the Burp Suite’s passive crawler identified many endpoints, although they appear rather dummy as majority of them just return 404
Interestingly, there is a Word Document file,
New_Starter_CheckList_v7.docx
About
Checking the static
/about.html
file shows exactly that.
The hyperlink located at the right-top corner is mapped to the aforementioned Word document file
Users
Moreover, the section below reveals a list of potential users;
Aileen Wallace, Charlotte Hall, Evan Davies, Ieuan Monks, Joshua Morgan, and Lois Hopkins
New_Starter_CheckList_v7.docx
┌──(kali㉿kali)-[~/archive/htb/labs/acute]
└─$ wget -q --no-check-certificate https://atsserver.acute.local/New_Starter_CheckList_v7.docx
Downloading the Word document file
While the
New_Starter_CheckList_v7.docx
file is indeed a form prepared for new starters, it reveals a few important information
I will go through them all
Dummy Endpoints
The endpoints above don’t exist as they returns 404
The same goes for those above
Default Credential
The default password appears to be
Passwrod1!
PowerShell Web Access (PSWA)
There appears to be an endpoint for PSWA, with a session named
dc_manage
with a few restrictions
Remote
The hyperlink leads to an endpoint at
/Acute_Staff_Access
Which redirects to a valid PSWA endpoint that was [[#[PowerShell Web Access](https //learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/hh831611(v=ws.11)) (PSWA)|mentioned]] above earlier
This appears to be the entry point
Lois
While
Lois
seems to be a legitimate user, the user also appear to be an admin user
Metadata
┌──(kali㉿kali)-[~/archive/htb/labs/acute]
└─$ file New_Starter_CheckList_v7.docx
New_Starter_CheckList_v7.docx: Microsoft Word 2007+
┌──(kali㉿kali)-[~/archive/htb/labs/acute]
└─$ exiftool New_Starter_CheckList_v7.docx
ExifTool Version Number : 12.67
File Name : New_Starter_CheckList_v7.docx
Directory : .
File Size : 35 kB
File Modification Date/Time : 2021:12:22 01:39:10+01:00
File Access Date/Time : 2023:11:07 14:17:36+01:00
File Inode Change Date/Time : 2023:11:07 14:17:22+01:00
File Permissions : -rw-r--r--
File Type : DOCX
File Type Extension : docx
MIME Type : application/vnd.openxmlformats-officedocument.wordprocessingml.document
Zip Required Version : 20
Zip Bit Flag : 0x0006
Zip Compression : Deflated
Zip Modify Date : 1980:01:01 00:00:00
Zip CRC : 0x079b7eb2
Zip Compressed Size : 428
Zip Uncompressed Size : 2527
Zip File Name : [Content_Types].xml
Creator : FCastle
Description : Created on Acute-PC01
Last Modified By : Daniel
Revision Number : 8
Last Printed : 2021:01:04 15:54:00Z
Create Date : 2021:12:08 14:21:00Z
Modify Date : 2021:12:22 00:39:00Z
Template : Normal.dotm
Total Edit Time : 2.6 hours
Pages : 3
Words : 886
Characters : 5055
Application : Microsoft Office Word
Doc Security : None
Lines : 42
Paragraphs : 11
Scale Crop : No
Heading Pairs : Title, 1
Titles Of Parts :
Company : University of Marvel
Links Up To Date : No
Characters With Spaces : 5930
Shared Doc : No
Hyperlinks Changed : No
App Version : 16.0000
Checking the metadata of the Word document reveals a few important information;
FCastle
is the creator and likely a valid username- This also may suggest the naming convention
Acute-PC01
is likely a host where the file was originated fromDaniel
might be another user
Fuzzing
┌──(kali㉿kali)-[~/archive/htb/labs/acute]
└─$ ffuf -c -w /usr/share/wordlists/seclists/Discovery/Web-Content/directory-list-2.3-medium.txt -u https://atsserver.acute.local/FUZZ -ic
________________________________________________
:: Method : GET
:: URL : https://atsserver.acute.local/FUZZ
:: Wordlist : FUZZ: /usr/share/wordlists/seclists/Discovery/Web-Content/directory-list-2.3-medium.txt
:: Follow redirects : false
:: Calibration : false
:: Timeout : 10
:: Threads : 40
:: Matcher : Response status: 200-299,301,302,307,401,403,405,500
________________________________________________
:: Progress: [220547/220547] :: Job [1/1] :: 210 req/sec :: Duration: [0:15:53] :: Errors: 0 ::
Unfortunately, nothing returned from fuzzing
Virtual Host / Sub-domain Discovery
┌──(kali㉿kali)-[~/archive/htb/labs/acute]
└─$ ffuf -c -w /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-110000.txt -u https://$IP/ -H 'Host: FUZZ.acute.local'
________________________________________________
:: Method : GET
:: URL : https://10.10.11.145/
:: Wordlist : FUZZ: /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-110000.txt
:: Header : Host: FUZZ.acute.local
:: Follow redirects : false
:: Calibration : false
:: Timeout : 10
:: Threads : 40
:: Matcher : Response status: 200-299,301,302,307,401,403,405,500
________________________________________________
:: Progress: [114441/114441] :: Job [1/1] :: 95 req/sec :: Duration: [0:26:51] :: Errors: 0 ::
Unable to find any additional virtual host or sub-domain as far as the wordlist covers