Web
Nmap discovered a Web server on the port 80
of the 192.168.225.152
host.
The running service is Microsoft IIS httpd 10.0
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/compromised]
└─$ curl -I -X OPTIONS http://$IP/
HTTP/1.1 200 OK
Allow: OPTIONS, TRACE, GET, HEAD, POST
Server: Microsoft-IIS/10.0
Public: OPTIONS, TRACE, GET, HEAD, POST
X-Powered-By: ASP.NET
Date: Sat, 28 Jun 2025 18:15:36 GMT
Content-Length: 0
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/compromised]
└─$ curl -I http://$IP/
HTTP/1.1 200 OK
Content-Length: 703
Content-Type: text/html
Last-Modified: Tue, 01 Jun 2021 14:59:09 GMT
Accept-Ranges: bytes
ETag: "3c7a34adf656d71:0"
Server: Microsoft-IIS/10.0
X-Powered-By: ASP.NET
Date: Sat, 28 Jun 2025 18:15:39 GMT
Webroot
It’s the default IIS installation page.
Fuzzing
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/compromised]
└─$ ffuf -c -w /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt -u http://$IP/FUZZ -ic -e .html,.txt,.aspx
________________________________________________
:: Method : GET
:: URL : http://192.168.225.152/FUZZ
:: Wordlist : FUZZ: /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt
:: Extensions : .html .txt .aspx
:: Follow redirects : false
:: Calibration : false
:: Timeout : 10
:: Threads : 40
:: Matcher : Response status: 200-299,301,302,307,401,403,405,500
________________________________________________
aspnet_client [Status: 301, Size: 160, Words: 9, Lines: 2, Duration: 21ms]
:: Progress: [81912/81912] :: Job [1/1] :: 1801 req/sec :: Duration: [0:00:46] :: Errors: 0 ::
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/compromised]
└─$ ffuf -c -w /usr/share/wordlists/seclists/Discovery/Web-Content/directory-list-lowercase-2.3-medium.txt -u http://$IP/FUZZ/ -ic
________________________________________________
:: Method : GET
:: URL : http://192.168.225.152/FUZZ/
:: Wordlist : FUZZ: /usr/share/wordlists/seclists/Discovery/Web-Content/directory-list-lowercase-2.3-medium.txt
:: Follow redirects : false
:: Calibration : false
:: Timeout : 10
:: Threads : 40
:: Matcher : Response status: 200-299,301,302,307,401,403,405,500
________________________________________________
[Status: 200, Size: 703, Words: 27, Lines: 32, Duration: 20ms]
:: Progress: [207630/207630] :: Job [1/1] :: 1694 req/sec :: Duration: [0:02:51] :: Errors: 0 ::
N/A
PSWA
As hinted from a PowerShell script found in the target SMB server, there might be a PSWA endpoint available on the web server.
PSWA endpoint identified.
As it requires SSL, continuing on the other web server.