Web
Nmap discovered a Web server on the target port 80
The running service is Microsoft IIS httpd 10.0
Webroot
The website appears vague
There is a section dedicated for receiving news letter, but it doesn’t appear functional
PDF Documents
There is also what appears to be Documents section that contains 2 hyperlinks to 2 PDF files, which were mapped by the passive crawler in Burp Suites
The content within those 2 PDF files are nothing more than just IPSUM
┌──(kali㉿kali)-[~/…/htb/labs/intelligence/pdf]
└─$ wget -q http://$IP/documents/2020-01-01-upload.pdf ; wget -q http://$IP/documents/2020-12-15-upload.pdf
Downloading those 2 PDF files for further review
File Name
┌──(kali㉿kali)-[~/…/htb/labs/intelligence/pdf]
└─$ file 2020-01-01-upload.pdf 2020-12-15-upload.pdf
2020-01-01-upload.pdf: PDF document, version 1.5
2020-12-15-upload.pdf: PDF document, version 1.5
While I have identified the version information of those 2 PDF files, their file naming structure also came into my attention.
There appears to be a naming convention for PDF files; <YEAR>-<MONTH>-<DATE>-upload.pdf
This observation hints at the possibility of the existence of additional PDF files. If that’s the case, I might consider conducting fuzzing
Metadata
┌──(kali㉿kali)-[~/…/htb/labs/intelligence/pdf]
└─$ exiftool 2020-01-01-upload.pdf 2020-12-15-upload.pdf
======== 2020-01-01-upload.pdf
ExifTool Version Number : 12.65
File Name : 2020-01-01-upload.pdf
Directory : .
File Size : 27 kB
File Modification Date/Time : 2023:02:08 17:01:03+01:00
File Access Date/Time : 2023:09:26 15:10:11+02:00
File Inode Change Date/Time : 2023:02:08 17:01:03+01:00
File Permissions : -rw-r--r--
File Type : PDF
File Type Extension : pdf
MIME Type : application/pdf
PDF Version : 1.5
Linearized : No
Page Count : 1
Creator : William.Lee
======== 2020-12-15-upload.pdf
ExifTool Version Number : 12.65
File Name : 2020-12-15-upload.pdf
Directory : .
File Size : 27 kB
File Modification Date/Time : 2023:02:08 17:01:26+01:00
File Access Date/Time : 2023:09:26 15:10:18+02:00
File Inode Change Date/Time : 2023:02:08 17:01:26+01:00
File Permissions : -rw-r--r--
File Type : PDF
File Type Extension : pdf
MIME Type : application/pdf
PDF Version : 1.5
Linearized : No
Page Count : 1
Creator : Jose.Williams
2 image files read
Checking the metadata reveals the usernames in the Creator
field;
- William.Lee
- Jose.Williams
- Judging by those 2 names, it suggests the naming convention that the target domain uses;
<FIRSTNAME>.<LASTNAME>
- This information could be leveraged to effectively extract valid domain users by performing an additional brute-force attack on the target KDC server