Web


Nmap discovered a Web server on the target port 80 The running service is Microsoft IIS httpd 10.0

Webroot It appears to be providing some kind of online service for business

Identical web app is available through the hostname

Wappalyzer identified technologies involved

There is the Out Team section that contains 8 individual profile, which may be potential domain users

Moreover, the Testimonials section contains 4 additional profiles

There is a contact form, but it does not appear to be functioning

2 additional potential users are found at the Our Blog section

Those images in the Our Blog section points to the single.html file, which was also picked up by the Burp Suite’s crawler

single.html


The single.html file appears to be the blog article It shows that it was posted by admin

The article itself it pretty much arbitrary There is what appears to be a search bar, but it’s not functional

At the bottom, There is a comment section with some comments and a form, which doesn’t work So far, the website appears strictly static

Fuzzing


┌──(kali㉿kali)-[~/archive/htb/labs/search]
└─$ ffuf -c -w /usr/share/wordlists/seclists/discovery/web-content/common.txt -t 200 -u http://$IP/FUZZ -ic
________________________________________________
 :: Method           : GET
 :: URL              : http://10.10.11.129/FUZZ
 :: Wordlist         : FUZZ: /usr/share/wordlists/seclists/Discovery/Web-Content/common.txt
 :: Follow redirects : false
 :: Calibration      : false
 :: Timeout          : 10
 :: Threads          : 200
 :: Matcher          : Response status: 200-299,301,302,307,401,403,405,500
________________________________________________
certenroll              [status: 301, Size: 154, Words: 9, Lines: 2, Duration: 111ms]
certsrv                 [status: 401, Size: 1293, Words: 81, Lines: 30, Duration: 112ms]
css                     [status: 301, Size: 147, Words: 9, Lines: 2, Duration: 78ms]
fonts                   [status: 301, Size: 149, Words: 9, Lines: 2, Duration: 31ms]
images                  [status: 301, Size: 150, Words: 9, Lines: 2, Duration: 36ms]
index.html              [status: 200, Size: 44982, Words: 13260, Lines: 1030, Duration: 40ms]
js                      [status: 301, Size: 146, Words: 9, Lines: 2, Duration: 42ms]
staff                   [status: 403, Size: 1233, Words: 73, Lines: 30, Duration: 68ms]
:: Progress: [4723/4723] :: Job [1/1] :: 4504 req/sec :: Duration: [0:00:01] :: Errors: 0 ::

ffuf discovered endpoints at /certenroll, /certsrv, and /staff

presence of both /certenroll and /certsrv endpoints indicate that the target dc host has adcs configured along with the web enrollment service. While this is rather expected since certsrv.exe was confirmed to to be present on several MSRPC endpoint, I will take a look at those web endpoints

/staff


403

/certenroll


403 as expected

/certsrv


The /certsrv prompts for the basic HTTP authentication, which is mostly configured with the credential of a domain admin