Web
Nmap discovered a Web server on the port 80
of the DEV-DATASCI-JUP
(10.10.232.68
) host.
The running service is Tornado httpd 6.0.3
┌──(kali㉿kali)-[~/archive/thm/weasel]
└─$ curl -I -X OPTIONS http://$IP:8888/
HTTP/1.1 405 Method Not Allowed
Server: TornadoServer/6.0.3
Content-Type: text/html; charset=UTF-8
Date: Sun, 06 Jul 2025 12:18:33 GMT
Content-Length: 87
┌──(kali㉿kali)-[~/archive/thm/weasel]
└─$ curl -I http://$IP:8888/
HTTP/1.1 405 Method Not Allowed
Server: TornadoServer/6.0.3
Content-Type: text/html; charset=UTF-8
Date: Sun, 06 Jul 2025 12:18:40 GMT
Content-Length: 87
┌──(kali㉿kali)-[~/archive/thm/weasel]
└─$ curl -i http://$IP:8888/
HTTP/1.1 302 Found
Server: TornadoServer/6.0.3
Content-Type: text/html; charset=UTF-8
Date: Sun, 06 Jul 2025 12:19:07 GMT
Location: /tree?
Content-Length: 0
Redirected to a Jupyter Notebook instance.
Authentication
An authentication token was revealed in the /misc/jupyter-token.txt
file found in the datasci-team
share of the DEV-DATASCI-JUP
(10.10.232.68
) host; 067470c5ddsadc54153ghfjd817d15b5d5f5341e56b0dsad78a
Logging in
Successfully authenticated.
This appears to be mirroring the
datasci-team
share as content are identical.
Jupyter Notebook supports code execution as it is a web-based IDE. Moving on to the Exploitation phase.