Web
Nmap discovered a Web server on the port 8080
of the dc01.heist.offsec
(192.168.198.165
) host.
The running service is Werkzeug httpd 2.0.1 (Python 3.9.0)
.
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/heist]
└─$ curl -I -X OPTIONS http://$IP:8080/
HTTP/1.0 200 OK
Content-Type: text/html; charset=utf-8
Allow: GET, HEAD, OPTIONS
Content-Length: 0
Server: Werkzeug/2.0.1 Python/3.9.0
Date: Mon, 07 Jul 2025 14:22:28 GMT
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/heist]
└─$ curl -I http://$IP:8080/
HTTP/1.0 200 OK
Content-Type: text/html; charset=utf-8
Content-Length: 21
Server: Werkzeug/2.0.1 Python/3.9.0
Date: Mon, 07 Jul 2025 14:22:46 GMT
Webroot
Web browser.
SSRF
SSRF confirmed.
It’s using the Win32 API likely containing a NTLM auth request.