Web


Nmap discovered a Web server on the target port 8172 over SSL The running service is Microsoft IIS httpd 10.0

┌──(kali㉿kali)-[~/archive/htb/labs/search]
└─$ curl -k -i https://$IP:8172/                      
HTTP/2 404 
server: Microsoft-IIS/10.0
date: Tue, 30 Jan 2024 13:57:48 GMT
content-length: 0

while this web server also uses http/2, much like the one on the port 443, the webroot returned 404

┌──(kali㉿kali)-[~/archive/htb/labs/search]
└─$ openssl s_client -connect $ip:8172
CONNECTED(00000003)
Can't use SSL_get_servername
depth=0 CN = WMSvc-SHA2-RESEARCH
verify error:num=18:self-signed certificate
verify return:1
depth=0 CN = WMSvc-SHA2-RESEARCH
verify return:1
---
Certificate chain
 0 s:CN = WMSvc-SHA2-RESEARCH
   i:CN = WMSvc-SHA2-RESEARCH
   a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256
   v:NotBefore: Apr  7 09:05:25 2020 GMT; NotAfter: Apr  5 09:05:25 2030 GMT
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=CN = WMSvc-SHA2-RESEARCH
issuer=CN = WMSvc-SHA2-RESEARCH
---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: RSA
Server Temp Key: ECDH, secp384r1, 384 bits
---
SSL handshake has read 1273 bytes and written 581 bytes
verification error: self-signed certificate
---
New, TLSv1.2, Cipher is ECDHE-RSA-AES256-GCM-SHA384
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : ECDHE-RSA-AES256-GCM-SHA384
    Session-ID: 253800001099E6723DF3225EACE9EA23A1A50E54EBDB5236260DDDEC9EA6A448
    Session-ID-ctx: 
    Master-Key: 48229CFE0CB46C6FFB3366B320E501569888E68842CB5986C0F18F3539E901B3973179D74D41A2D7CF874BECBE9DF672
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    Start Time: 1706623419
    Timeout   : 7200 (sec)
    Verify return code: 18 (self-signed certificate)
    Extended master secret: yes
---

Checking the certificate revealed that it’s generated by WMSvc wmsvc is the iis remote web management service

Unfortunately, this alone does not lead anywhere

Fuzzing


┌──(kali㉿kali)-[~/archive/htb/labs/search]
└─$ ffuf -c -w /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt -t 200 -u https://$IP:8172/FUZZ -ic
________________________________________________
 :: Method           : GET
 :: URL              : https://10.10.11.129:8172/FUZZ
 :: Wordlist         : FUZZ: /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt
 :: Follow redirects : false
 :: Calibration      : false
 :: Timeout          : 10
 :: Threads          : 200
 :: Matcher          : Response status: 200-299,301,302,307,401,403,405,500
________________________________________________
:: Progress: [20476/20476] :: Job [1/1] :: 268 req/sec :: Duration: [0:00:56] :: Errors: 0 ::

Nothing shows up