Web


Nmap discovered a Web server on the target port 80 The running service is GoAhead WebServer

┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/kevin]
└─$ curl -I http://$IP/    
HTTP/1.0 302 Redirect
Server: GoAhead-Webs
Date: Thu Feb 27 09:47:09 2025
Pragma: no-cache
Cache-Control: no-cache
Content-Type: text/html
Location: http://192.168.221.45/index.asp
 
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/kevin]
└─$ curl -I http://$IP/index.asp
HTTP/1.0 200 OK
Date: Thu Feb 27 09:47:23 2025
Server: GoAhead-Webs
Pragma: no-cache
Cache-Control: no-cache
Content-type: text/html

Redirected to the index.asp endpoint Based on the extension alone, .asp, it would appears to be a classic ASP web application, HP Power Manager

Testing a default credential works; admin:admin

Checking the HELP section reveals the version information; 4.2 (Build 7)

Vulnerabilities


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/kevin]
└─$ searchsploit HP Power Manager          
-------------------------------------------------------- ---------------------------------
 Exploit Title                                          |  Path
-------------------------------------------------------- ---------------------------------
Flying Dog Software Powerslave 4.3 Portalmanager - 'sql | php/webapps/23163.txt
Hewlett-Packard (HP) Power Manager Administration - Rem | windows/remote/16785.rb
Hewlett-Packard (HP) Power Manager Administration Power | windows/remote/10099.py
HP Power Manager - 'formExportDataLogs' Remote Buffer O | cgi/remote/18015.rb
-------------------------------------------------------- ---------------------------------
Shellcodes: No Results
Papers: No Results

Checking HP Power Manager on Exploit-DB for vulnerabilities reveals a RCE exploit; CVE-2009-2685