Web
Nmap discovered a Web service on the target port 80
The running service is Apache httpd 2.4.29 ((Ubuntu))
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/apex]
└─$ curl -I http://$IP/
HTTP/1.1 200 OK
Date: Wed, 05 Feb 2025 19:54:33 GMT
Server: Apache/2.4.29 (Ubuntu)
Last-Modified: Mon, 17 May 2021 15:00:14 GMT
ETag: "711d-5c287d9d2c6e3"
Accept-Ranges: bytes
Content-Length: 28957
Vary: Accept-Encoding
Content-Type: text/html
Webroot
It appears to be a website for a hospital
Updated the /etc/hosts file
Fuzzing
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/apex]
└─$ ffuf -c -w /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt -u http://apex.offsec/FUZZ -ic
________________________________________________
:: Method : GET
:: URL : http://apex.offsec/FUZZ
:: Wordlist : FUZZ: /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt
:: Follow redirects : false
:: Calibration : false
:: Timeout : 10
:: Threads : 40
:: Matcher : Response status: 200-299,301,302,307,401,403,405,500
________________________________________________
.htaccess [Status: 403, Size: 276, Words: 20, Lines: 10, Duration: 3790ms]
.htpasswd [Status: 403, Size: 276, Words: 20, Lines: 10, Duration: 3848ms]
assets [Status: 301, Size: 311, Words: 20, Lines: 10, Duration: 20ms]
filemanager [Status: 301, Size: 316, Words: 20, Lines: 10, Duration: 36ms]
server-status [Status: 403, Size: 276, Words: 20, Lines: 10, Duration: 25ms]
source [Status: 301, Size: 311, Words: 20, Lines: 10, Duration: 25ms]
thumbs [Status: 301, Size: 311, Words: 20, Lines: 10, Duration: 36ms]
:: Progress: [20478/20478] :: Job [1/1] :: 1574 req/sec :: Duration: [0:00:16] :: Errors: 0 ::/filemanager//source/
/source/ Directory
/Practice/Apex/2-Enumeration/attachments/{8A85D3E4-578A-4481-9312-AFABFE6E9A67}.png)
/source/images
N/A
/source/Documents
The /source/Documents directory corresponds to the docs Samba share
/filemanager
There appears to be another web application running on the /filemanager endpoint
It shows the /source directory above
It’s written in PHP
The application is Responsive FileManager 9.13.4
Vulnerabilities
It would appear that the target instance has multiple vulnerabilities;
OpenEMR
There is an endpoint; /openemr
301 to a login page at /openemr/interface/login/login.php?site=default
It’s hosting a OpenEMR instance