Web


Nmap discovered a Web server on the target port 450 The running service is Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)

┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/butch]
└─$ curl -I http://$IP:450/ 
HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 2128
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/10.0
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET
Date: Wed, 26 Feb 2025 12:31:37 GMT

Webroot It’s a login page to a custom ASP.NET web application

SQLi


SQLi entrypoint discovered username field is vulnerable to SQL injection Based on the returned error message, the backend DB appears to be MSSQL Given this is a login page with the returned SQL error, both Error-based and Blind SQLi can be performed

Fuzzing


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/butch]
└─$ ffuf -c -w /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt -u http://$IP:450/FUZZ -ic
________________________________________________
 :: Method           : GET
 :: URL              : http://192.168.238.63:450/FUZZ
 :: Wordlist         : FUZZ: /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt
 :: Follow redirects : false
 :: Calibration      : false
 :: Timeout          : 10
 :: Threads          : 40
 :: Matcher          : Response status: 200-299,301,302,307,401,403,405,500
________________________________________________
dev                     [Status: 301, Size: 153, Words: 9, Lines: 2, Duration: 21ms]
:: Progress: [20478/20478] :: Job [1/1] :: 1612 req/sec :: Duration: [0:00:11] :: Errors: 0 ::

/dev/

/dev/


/dev/site.master.txt


The official Microsoft documentation for site.master indicates that this file provides a template for every page on an ASP.NET MVC-style application.

The file indicates that this webpage uses C# as a backend language, uses a site.master file as a template and often resides in the web root. This file can also contain C# arbitrary code, which is not mentioned in the Microsoft documentation. This may be leveraged for code execution