Hades
Entry Point
10.13.38.16
initial nmap scan
sudo nmap -p- --min-rate 1500 -T4 10.13.38.16 | cut -d'/' -f1 | tr '\n' ','
we can see we have the following port open on the target machine
443
Lets see if we can enumerate further information
sudo nmap -sCV -p443 -A -oA TCP_10.13.38.16 10.13.38.16
results
Starting Nmap 7.94 ( https://nmap.org ) at 2024-01-21 20:31 EST
Nmap scan report for 10.13.38.16
Host is up (0.29s latency).
PORT STATE SERVICE VERSION
443/tcp open ssl/https Apache/2.4.29 (Ubuntu)
|_http-title: 400 Bad Request
| tls-alpn:
|_ http/1.1
| ssl-cert: Subject: commonName=10.13.38.16/organizationName=Gigantic Hosting Limited/stateOrProvinceName=New York/countryName=US
| Not valid before: 2019-09-04T21:52:00
|_Not valid after: 2039-08-30T21:52:00
|_http-server-header: Apache/2.4.29 (Ubuntu)
|_ssl-date: TLS randomness does not represent time
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose|phone|specialized
Running (JUST GUESSING): Microsoft Windows 2012|8|Phone|7 (89%)
OS CPE: cpe:/o:microsoft:windows_server_2012 cpe:/o:microsoft:windows_8 cpe:/o:microsoft:windows cpe:/o:microsoft:windows_7
Aggressive OS guesses: Microsoft Windows Server 2012 (89%), Microsoft Windows Server 2012 or Windows Server 2012 R2 (89%), Microsoft Windows Server 2012 R2 (89%), Microsoft Windows 8.1 Update 1 (86%), Microsoft Windows Phone 7.5 or 8.0 (86%), Microsoft Windows Embedded Standard 7 (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 2 hops
TRACEROUTE (using port 443/tcp)
HOP RTT ADDRESS
1 286.09 ms 10.10.14.1
2 286.68 ms 10.13.38.16
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 29.34 seconds
Whatwe can see
We have HTTPS enabled Apache 2.4.29 (Ubuntu)
Server itself may be windows server 2012
HTTPS

we can see
Web server is running Ubuntu (server or container?)
we have emails
sales@gigantichosting.com
we can add the domain name to our hosts file
we find
/ssltools/certificate.php
which looks like a tool to retrieve the SSL cert from a specified domain name or IP address

Lets play around with this
we want to request our own IP address, and see if we can sniff out any data, Since the client (certificate.php) is utilizing SSL we cant simply view the HTTP data directly, we need to utilize a tool called MITMPROXY
we can donwload the following tools from
sudo /opt/mitmdump -p 443 --mode reverse:https://10.13.38.16 --ssl-insecure --set flow_detail=3
-p
: specifying our local port '443'-mode reverse:https://10.13.18.16
: this will set mitmproxy in reverse proxy mode, forwarding traffic back to our target--ssl-insecure
: disables ssl certificate validation--set flow_detail=3
: This setts the verbosity of flow details to a level 3
Now we can point the PHP function to our local machine
after trying to send a request back to our local machine we wearnt getting anything
Looking at the SSL certificate for the website we can find another email address
it@gigantichosting.com
feroxbuster
i want to see if we can find any hidden web pages
feroxbuster -k -u https://gigantichosting.com -w /usr/share/seclists/SecLists-master/Discovery/Web-Content/directory-list-lowercase-2.3-medium.txt -o 10.13.38.16_dirs.txt -x php
results
301 GET 9l 28w 329c https://gigantichosting.com/images => https://gigantichosting.com/images/
200 GET 151l 439w 6090c https://gigantichosting.com/support.html
200 GET 21l 187w 12696c https://gigantichosting.com/images/logo.png
200 GET 33l 144w 12681c https://gigantichosting.com/images/c-logo5.png
200 GET 239l 841w 10374c https://gigantichosting.com/services.html
200 GET 21l 97w 7075c https://gigantichosting.com/images/c-logo1.png
200 GET 207l 689w 9174c https://gigantichosting.com/about.html
200 GET 33l 161w 11330c https://gigantichosting.com/images/c-logo6.png
200 GET 24l 156w 11339c https://gigantichosting.com/images/c-logo4.png
200 GET 270l 929w 11930c https://gigantichosting.com/clients.html
200 GET 357l 990w 8186c https://gigantichosting.com/css/owl.carousel.css
200 GET 343l 1065w 14688c https://gigantichosting.com/index.html
200 GET 4l 1421w 96381c https://gigantichosting.com/js/jquery.min.js
200 GET 50l 118w 1268c https://gigantichosting.com/js/nav.js
200 GET 4l 48w 17780c https://gigantichosting.com/fonts/css/font-awesome.min.css
200 GET 23l 133w 10584c https://gigantichosting.com/images/c-logo.png
200 GET 23l 123w 9804c https://gigantichosting.com/images/c-logo3.png
200 GET 77l 121w 1066c https://gigantichosting.com/ssltools/certificate.php
200 GET 1585l 3117w 28067c https://gigantichosting.com/css/style.css
200 GET 1470l 3315w 37908c https://gigantichosting.com/js/owl.carousel.js
200 GET 5785l 13825w 121261c https://gigantichosting.com/css/bootstrap.css
200 GET 343l 1065w 14688c https://gigantichosting.com/
301 GET 9l 28w 326c https://gigantichosting.com/css => https://gigantichosting.com/css/
301 GET 9l 28w 325c https://gigantichosting.com/js => https://gigantichosting.com/js/
Last updated