Initial Recon

image.png

Ref 1: Results of netdiscover command to detect all machines on the network

image.png

Ref 2: nmap scan with -T4 for the preferred speed of the scan, -p- to scan all ports, -A for scanning everything including versions numbers and operating system information, then the target address

Enumerating HTTP

image.png

Ref 1: Target default site has been accessed (poor hygeine)

We snooped around and clicked on the “documentation” hyperlink and it was not found. But instead of giving us a generic 404 Not Found page, we received a bit of valuable information:

image.png

Ref 2: Information disclosure // Server and version (Apache/1.3.20)

image.png

Ref 3: We then ran nikto which is a website vulnerability scanner tool against the host and we got a lot of valuable information from the result

image.png