Web


Nmap discovered a Web server on the target port 8000 The running service is ttyd 1.7.3-a2312cb (libwebsockets 3.2.0)

┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/pc]
└─$ curl -I -X OPTIONS http://$IP:8000/
HTTP/1.1 200 OK
server: ttyd/1.7.3-a2312cb (libwebsockets/3.2.0)
content-type: text/html
content-length: 677047
 
 
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/pc]
└─$ curl -I http://$IP:8000/        
HTTP/1.1 200 OK
server: ttyd/1.7.3-a2312cb (libwebsockets/3.2.0)
content-type: text/html
content-length: 677047

It’s a TTY

Initial Foothold established to the target system as the user account via a web TTY