Web


Nmap discovered a Web service on the target port 80 The running service is Microsoft IIS httpd 10.0

It’s a website for a software development company

About


The about section claims that the website is down for maintenance. It outlines that invoices or requests can be made to accounts@axlle.htb in Excel format. It also claims that all macros are disabled for security purpose.

Leveraging Excel macro has been a common practice for code execution. As common as it is, it is blocked & disabled by default.

Additionally, there are many extensions that are associated with Excel, and some of them can be used for code execution.

.xll being one of them. It’s a DLL executable for Excel. There is a very high likelihood of the target Excel instance accepting the .xll format, and I will explore that

accounts@axlle.htb


┌──(kali㉿kali)-[~/archive/htb/labs/axlle]
└─$ echo accounts > users.txt                                        
 
┌──(kali㉿kali)-[~/archive/htb/labs/axlle]
└─$ kerbrute userenum --dc mainframe.axlle.htb -d AXLLE.HTB ./users.txt                           
 
    __             __               __     
   / /_____  _____/ /_  _______  __/ /____ 
  / //_/ _ \/ ___/ __ \/ ___/ / / / __/ _ \
 / ,< /  __/ /  / /_/ / /  / /_/ / /_/  __/
/_/|_|\___/_/  /_.___/_/   \__,_/\__/\___/                                        
 
Version: v1.0.3 (9dad6e1) - 06/26/24 - Ronnie Flathers @ropnop
 
2024/06/26 18:31:57 >  Using KDC(s):
2024/06/26 18:31:57 >  	mainframe.axlle.htb:88
 
2024/06/26 18:32:02 >  Done! Tested 1 usernames (0 valid) in 5.116 seconds

The account, accounts, doesn’t appear to be a domain account

Projects


The Projects section features 2 projects; OSINT engine and Keyboard Translator

Wappalyzer identified technologies involved

Fuzzing


┌──(kali㉿kali)-[~/archive/htb/labs/axlle]
└─$ ffuf -c -w /usr/share/wordlists/seclists/Discovery/Web-Content/directory-list-2.3-big.txt -t 200 -u 'http://mainframe.axlle.htb/FUZZ' -ic
________________________________________________
 :: Method           : GET
 :: URL              : http://mainframe.axlle.htb/FUZZ
 :: Wordlist         : FUZZ: /usr/share/wordlists/seclists/Discovery/Web-Content/directory-list-2.3-big.txt
 :: Follow redirects : false
 :: Calibration      : false
 :: Timeout          : 10
 :: Threads          : 200
 :: Matcher          : Response status: 200-299,301,302,307,401,403,405,500
________________________________________________
                        [Status: 200, Size: 10228, Words: 3640, Lines: 167, Duration: 32ms]
assets                  [Status: 301, Size: 157, Words: 9, Lines: 2, Duration: 146ms]
css                     [Status: 301, Size: 154, Words: 9, Lines: 2, Duration: 132ms]
js                      [Status: 301, Size: 153, Words: 9, Lines: 2, Duration: 96ms]
Assets                  [Status: 301, Size: 157, Words: 9, Lines: 2, Duration: 99ms]
CSS                     [Status: 301, Size: 154, Words: 9, Lines: 2, Duration: 84ms]
JS                      [Status: 301, Size: 153, Words: 9, Lines: 2, Duration: 89ms]
:: Progress: [1273820/1273820] :: Job [1/1] :: 3003 req/sec :: Duration: [0:11:52] :: Errors: 0 ::

Nothing found

Virtual Host / Sub-domain Discovery


┌──(kali㉿kali)-[~/archive/htb/labs/axlle]
└─$ ffuf -c -w /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-110000.txt -t 200 -u http://$IP/ -H 'Host: FUZZ.axlle.htb' -ic -mc all -fs 10228
________________________________________________
 :: Method           : GET
 :: URL              : http://10.10.11.21/
 :: Wordlist         : FUZZ: /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-110000.txt
 :: Header           : Host: FUZZ.axlle.htb
 :: Follow redirects : false
 :: Calibration      : false
 :: Timeout          : 10
 :: Threads          : 200
 :: Matcher          : Response status: all
 :: Filter           : Response size: 10228
________________________________________________

Nothing found