Web
Nmap discovered a web server on the target port 8808
Webroot
It’s the default IIS installation page.
Fuzzing
┌──(kali㉿kali)-[~/archive/htb/labs/secnotes]
└─$ ffuf -c -w /usr/share/wordlists/seclists/Discovery/Web-Content/directory-list-2.3-medium.txt -u http://$IP:8808/FUZZ -ic -e .txt,.php,.html
________________________________________________
:: Method : GET
:: URL : http://10.10.10.97:8808/FUZZ
:: Wordlist : FUZZ: /usr/share/wordlists/seclists/Discovery/Web-Content/directory-list-2.3-medium.txt
:: Extensions : .txt .php .html
:: Follow redirects : false
:: Calibration : false
:: Timeout : 10
:: Threads : 40
:: Matcher : Response status: 200,204,301,302,307,401,403,405,500
________________________________________________
:: Progress: [882188/882188] :: Job [1/1] :: 1331 req/sec :: Duration: [0:12:08] :: Errors: 0 ::
Fuzzing reveals absolutely nothing.
Served/Mirrored from SMB
It was suspected that the //secnotes.htb/new-site
SMB share is serving/mirroring the web server running on the target port 8808
A test file was uploaded to the SMB share, I will now navigate to it to check my theory
The theory is confirmed.
The
//secnotes.htb/new-site
SMB share is serving/mirroring the web root here.
I will get straights to the exploitation