Web
Nmap discovered a Web server on the target port 6060
The running service is unknown at this time
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/fish]
└─$ curl -I -X OPTIONS http://$IP:6060/
HTTP/1.1 403
Cache-Control: private
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: JSESSIONID=FE53612D640B92FAC5CC1473F596603A; Path=/
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 5028
Date: Sat, 30 Oct 2021 04:06:13 GMT
Server: Synametrics Web Server v7
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/fish]
└─$ curl -I http://$IP:6060/
HTTP/1.1 200
Accept-Ranges: bytes
ETag: W/"425-1267803922000"
Last-Modified: Fri, 05 Mar 2010 15:45:22 GMT
Content-Type: text/html
Content-Length: 425
Date: Sat, 30 Oct 2021 04:06:16 GMT
Server: Synametrics Web Server v7
Synametrics Web Server v7
Webroot
Redirected to a SynaMan login page at
/app
SynaMan (Synametrics File Manager) is a web-based file management and transfer tool that allows users to access, share, and manage files on a remote system securely via a browser. It supports large file transfers, secure access controls, and remote file management without needing a VPN. Ideal for businesses, it simplifies file sharing across different locations while maintaining data privacy.
Version Information
The version information is disclosed at the
/app?operation=about
endpoint; 5.1 build 1595
Vulnerabilities
Looking it up online for known vulnerabilities reveals 2 vulnerabilities;
Fuzzing
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/fish]
└─$ ffuf -c -w /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt -u http://$IP:6060/FUZZ -ic -e .html,.txt -fc 403
________________________________________________
:: Method : GET
:: URL : http://192.168.219.168:6060/FUZZ
:: Wordlist : FUZZ: /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt
:: Extensions : .html .txt
:: Follow redirects : false
:: Calibration : false
:: Timeout : 10
:: Threads : 40
:: Matcher : Response status: 200-299,301,302,307,401,403,405,500
:: Filter : Response status: 403
________________________________________________
app [Status: 200, Size: 6487, Words: 365, Lines: 226, Duration: 33ms]
contents [Status: 302, Size: 0, Words: 1, Lines: 1, Duration: 37ms]
images [Status: 302, Size: 0, Words: 1, Lines: 1, Duration: 34ms]
:: Progress: [61434/61434] :: Job [1/1] :: 1030 req/sec :: Duration: [0:00:58] :: Errors: 0 ::
contents
/contents/
Endpoint
Interestingly it shows
synaman 4.0
The instance might not be 5.1
SynaMan 4.0
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/fish]
└─$ searchsploit SynaMan 4.0
------------------------------------------------------------------ ---------------------------------
Exploit Title | Path
------------------------------------------------------------------ ---------------------------------
SynaMan 4.0 build 1488 - (Authenticated) Cross-Site Scripting | windows/webapps/45386.txt
SynaMan 4.0 build 1488 - SMTP Credential Disclosure | windows/webapps/45387.txt
------------------------------------------------------------------ ---------------------------------
Shellcodes: No Results
Papers: No Results
SynaMan 4.0
appears to suffer from multiple vulnerabilities, including SMTP credential disclosure; CVE-2018-10814