Web
Nmap discovered a Web server on the target port 9443
The running service is Apache httpd 2.4.58 ((Ubuntu))
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/vmdak]
└─$ curl -k -I -X OPTIONS https://vmdak.local:9443/
HTTP/1.1 200 OK
Date: Wed, 09 Apr 2025 17:34:48 GMT
Server: Apache/2.4.58 (Ubuntu)
Vary: Accept-Encoding
Content-Length: 5473
Content-Type: text/html; charset=UTF-8
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/vmdak]
└─$ curl -k -I https://vmdak.local:9443/
HTTP/1.1 200 OK
Date: Wed, 09 Apr 2025 17:34:52 GMT
Server: Apache/2.4.58 (Ubuntu)
Content-Type: text/html; charset=UTF-8
Webroot
Prison Management System
Default Credential
Project website shows the default credential;
admin
:admin123
Successfully authenticated
Leave Management
Checking the Leave Management tab reveals a set of CLEARTEXT credential;
malcom
:RonnyCache001
Vulnerabilities
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/vmdak]
└─$ searchsploit Prison Management System
------------------------------------------------------------------ ---------------------------------
Exploit Title | Path
------------------------------------------------------------------ ---------------------------------
Prison Management System - SQL Injection Authentication Bypass | php/webapps/52017.txt
------------------------------------------------------------------ ---------------------------------
Shellcodes: No Results
Papers: No Results
Checking for vulnerabilities reveals a SQLi to bypass authentication; CVE-2024-33288
It would appear that the target Prison Management System instance suffers from multiple vulnerabilities;
Fuzzing
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/vmdak]
└─$ ffuf -c -w /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt -u https://vmdak.local:9443/FUZZ -ic -e .html,.txt,.php -fc 403
________________________________________________
:: Method : GET
:: URL : https://vmdak.local:9443/FUZZ
:: Wordlist : FUZZ: /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt
:: Extensions : .html .txt .php
:: Follow redirects : false
:: Calibration : false
:: Timeout : 10
:: Threads : 40
:: Matcher : Response status: 200-299,301,302,307,401,403,405,500
:: Filter : Response status: 403
________________________________________________
Admin [Status: 301, Size: 318, Words: 20, Lines: 10, Duration: 23ms]
css [Status: 301, Size: 316, Words: 20, Lines: 10, Duration: 27ms]
fonts [Status: 301, Size: 318, Words: 20, Lines: 10, Duration: 22ms]
image [Status: 301, Size: 318, Words: 20, Lines: 10, Duration: 28ms]
images [Status: 301, Size: 319, Words: 20, Lines: 10, Duration: 28ms]
inc [Status: 301, Size: 316, Words: 20, Lines: 10, Duration: 27ms]
index.php [Status: 200, Size: 5473, Words: 1487, Lines: 129, Duration: 21ms]
js [Status: 301, Size: 315, Words: 20, Lines: 10, Duration: 21ms]
lib [Status: 301, Size: 316, Words: 20, Lines: 10, Duration: 22ms]
plugin [Status: 301, Size: 319, Words: 20, Lines: 10, Duration: 22ms]
:: Progress: [81912/81912] :: Job [1/1] :: 1626 req/sec :: Duration: [0:00:59] :: Errors: 0 ::
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/vmdak]
└─$ ffuf -c -w /usr/share/wordlists/seclists/Discovery/Web-Content/directory-list-lowercase-2.3-medium.txt -u https://vmdak.local:9443/FUZZ/ -ic
________________________________________________
:: Method : GET
:: URL : https://vmdak.local:9443/FUZZ/
:: Wordlist : FUZZ: /usr/share/wordlists/seclists/Discovery/Web-Content/directory-list-lowercase-2.3-medium.txt
:: Follow redirects : false
:: Calibration : false
:: Timeout : 10
:: Threads : 40
:: Matcher : Response status: 200-299,301,302,307,401,403,405,500
________________________________________________
[Status: 200, Size: 5473, Words: 1487, Lines: 129, Duration: 23ms]
images [Status: 200, Size: 1978, Words: 110, Lines: 22, Duration: 23ms]
icons [Status: 403, Size: 278, Words: 20, Lines: 10, Duration: 25ms]
image [Status: 200, Size: 2454, Words: 128, Lines: 24, Duration: 23ms]
css [Status: 200, Size: 3704, Words: 183, Lines: 30, Duration: 23ms]
lib [Status: 200, Size: 952, Words: 64, Lines: 17, Duration: 44ms]
database [Status: 403, Size: 278, Words: 20, Lines: 10, Duration: 28ms]
js [Status: 200, Size: 4050, Words: 207, Lines: 32, Duration: 23ms]
inc [Status: 200, Size: 1341, Words: 90, Lines: 19, Duration: 25ms]
fonts [Status: 200, Size: 3147, Words: 173, Lines: 26, Duration: 23ms]
plugin [Status: 200, Size: 942, Words: 64, Lines: 17, Duration: 37ms]
server-status [Status: 403, Size: 278, Words: 20, Lines: 10, Duration: 29ms]
:: Progress: [207630/207630] :: Job [1/1] :: 1428 req/sec :: Duration: [0:02:32] :: Errors: 0 ::
N/A
Virtual Host / Sub-domain Discovery
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/vmdak]
└─$ ffuf -c -w /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-110000.txt -u https://$IP:9443/ -H 'Host: FUZZ.vmdak.local' -ic -mc all -fs 5473
________________________________________________
:: Method : GET
:: URL : https://192.168.125.103:9443/
:: Wordlist : FUZZ: /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-110000.txt
:: Header : Host: FUZZ.vmdak.local
:: Follow redirects : false
:: Calibration : false
:: Timeout : 10
:: Threads : 40
:: Matcher : Response status: all
:: Filter : Response size: 5473
________________________________________________
:: Progress: [114437/114437] :: Job [1/1] :: 1298 req/sec :: Duration: [0:01:41] :: Errors: 0 ::
N/A