Web


Nmap discovered a Web server on the target port 50080 The running service is Apache httpd 2.4.46 ((Unix) PHP/7.4.15)

┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/hawat]
└─$ curl -I -X OPTIONS http://$IP:50080/
HTTP/1.1 200 OK
Date: Sat, 08 Mar 2025 14:28:24 GMT
Server: Apache/2.4.46 (Unix) PHP/7.4.15
Allow: GET,POST,OPTIONS,HEAD,TRACE
Content-Length: 0
Content-Type: text/html
 
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/hawat]
└─$ curl -I http://$IP:50080/        
HTTP/1.1 200 OK
Date: Sat, 08 Mar 2025 14:28:30 GMT
Server: Apache/2.4.46 (Unix) PHP/7.4.15
Last-Modified: Mon, 15 Feb 2021 16:23:07 GMT
ETag: "2380-5bb6266aed339"
Accept-Ranges: bytes
Content-Length: 9088
Content-Type: text/html

Webroot It appears to be a website for a pizza restaurant

It appears to be a static website

Form Submission


There is a form at the bottom of the page, but the web app is configured to send submission to the W3’s default https://www.w3schools.com/action_page.php page This suggests that this is just a demo page

Fuzzing


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/hawat]
└─$ ffuf -c -w /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt -u http://$IP:50080/FUZZ -ic -e .php
________________________________________________
 :: Method           : GET
 :: URL              : http://192.168.162.147:50080/FUZZ
 :: Wordlist         : FUZZ: /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt
 :: Extensions       : .php 
 :: Follow redirects : false
 :: Calibration      : false
 :: Timeout          : 10
 :: Threads          : 40
 :: Matcher          : Response status: 200-299,301,302,307,401,403,405,500
________________________________________________
.htaccess               [Status: 403, Size: 980, Words: 101, Lines: 43, Duration: 31ms]
.htaccess.php           [Status: 403, Size: 980, Words: 101, Lines: 43, Duration: 31ms]
.htpasswd.php           [Status: 403, Size: 980, Words: 101, Lines: 43, Duration: 2783ms]
4                       [Status: 301, Size: 239, Words: 14, Lines: 8, Duration: 25ms]
.htpasswd               [Status: 403, Size: 980, Words: 101, Lines: 43, Duration: 3871ms]
cgi-bin/                [Status: 403, Size: 994, Words: 102, Lines: 43, Duration: 30ms]
cgi-bin/.php            [Status: 403, Size: 980, Words: 101, Lines: 43, Duration: 32ms]
cloud                   [Status: 301, Size: 243, Words: 14, Lines: 8, Duration: 32ms]
images                  [Status: 301, Size: 244, Words: 14, Lines: 8, Duration: 26ms]
~bin                    [Status: 403, Size: 980, Words: 101, Lines: 43, Duration: 30ms]
~http                   [Status: 403, Size: 980, Words: 101, Lines: 43, Duration: 29ms]
~ftp                    [Status: 403, Size: 980, Words: 101, Lines: 43, Duration: 30ms]
~mail                   [Status: 403, Size: 980, Words: 101, Lines: 43, Duration: 26ms]
~nobody                 [Status: 403, Size: 980, Words: 101, Lines: 43, Duration: 27ms]
~root                   [Status: 403, Size: 980, Words: 101, Lines: 43, Duration: 27ms]
:: Progress: [40956/40956] :: Job [1/1] :: 1526 req/sec :: Duration: [0:00:33] :: Errors: 0 ::
 
 
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/hawat]
└─$ ffuf -c -w /usr/share/wordlists/seclists/Discovery/Web-Content/directory-list-lowercase-2.3-medium.txt -u http://$IP:50080/FUZZ -ic -e .php
________________________________________________
 :: Method           : GET
 :: URL              : http://192.168.162.147:50080/FUZZ
 :: Wordlist         : FUZZ: /usr/share/wordlists/seclists/Discovery/Web-Content/directory-list-lowercase-2.3-medium.txt
 :: Extensions       : .php 
 :: Follow redirects : false
 :: Calibration      : false
 :: Timeout          : 10
 :: Threads          : 40
 :: Matcher          : Response status: 200-299,301,302,307,401,403,405,500
________________________________________________
                        [Status: 200, Size: 9088, Words: 1204, Lines: 193, Duration: 26ms]
images                  [Status: 301, Size: 244, Words: 14, Lines: 8, Duration: 25ms]
4                       [Status: 301, Size: 239, Words: 14, Lines: 8, Duration: 30ms]
cloud                   [Status: 301, Size: 243, Words: 14, Lines: 8, Duration: 32ms]
:: Progress: [415260/415260] :: Job [1/1] :: 1398 req/sec :: Duration: [0:05:17] :: Errors: 0 ::

/cloud/

Nextcloud (/cloud/)


Accessing the /cloud/ directory redirects to a Nextcloud login page at the /cloud/index.php/login endpoint

Authentication


The default credential specified in the official documentation did not work

However, admin:admin works

General Information


The instance’s version is 20.0.7

The target system’s environment can be checked through the administration page

File


The interesting bit is in the File tab as it contains what appears to be the source code of the issue tracker application that is running on the target port 17445. Downloading the archive for further analysis