Web
Nmap discovered a Web server on the target port 8000
The running service is ttyd 1.7.3-a2312cb (libwebsockets 3.2.0)
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/pc]
└─$ curl -I -X OPTIONS http://$IP:8000/
HTTP/1.1 200 OK
server: ttyd/1.7.3-a2312cb (libwebsockets/3.2.0)
content-type: text/html
content-length: 677047
 
 
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/pc]
└─$ curl -I http://$IP:8000/        
HTTP/1.1 200 OK
server: ttyd/1.7.3-a2312cb (libwebsockets/3.2.0)
content-type: text/html
content-length: 677047/Practice/pc/2-Enumeration/attachments/{939BC16A-DC91-4A29-AAFB-B769C0F23437}.png) It’s a TTY
It’s a TTY
/Practice/pc/2-Enumeration/attachments/{78242DD9-43D6-4B0D-B6EB-9DE4F9BE1790}.png) Initial Foothold established to the target system as the
Initial Foothold established to the target system as the user account via a web TTY