Katana
MACHINE IP: 10.1.1.52
DATE: 9/10/2019
START TIME: 11:36 PM
NMAP
So quite a few ports open. Let’s start our enumeration from HTTP services.
HTTP
I started running nikto
scan on the port 80
and 20000
, that showed that port 20000 allowed TRACE
http method but there were no cookie or anything like that there so I could’nt use it.
With gobuster I found aspnet_client
directory on port 80
When I ran another scan on IP/aspnet_client
I found another directory
But after that I got nothing and none of those directory had anything in them.
Then I ran gobuster
scan on port 20000
and that’s where I found few 200 and few 301 directory.
The interesting one was the /platform
one because there I found manhali
running.
After looking at this kind of software
running I searched it with searchsploit and found Manhali 1.8 - Local File Inclusion.
It said that there was LFI on /manhali/includes/download.php?f=../includes/dbconfig.php
.
I tried to include the same file and it worked.
➜ http -b http://10.1.1.52:20000/platform/includes/download.php/\?f\=../includes/dbconfig.php
But I was confused with how to use this vulnerability properly. Then after sometime I decided to just look around the platform. If we look at the articles one of the article mentions about guest login.
So I used guest:guest
as credentials and I was able to login.
In the file manager section I found out that there was a docx
file present so I decided to check it out.
I downloaded the file from 10.1.1.52:20000/platform//docs/1k8iiljeqocbyl55t185hzmg.docx
and it had some information about some vhost file.
This could mean that we need to use LFI to see this file i.e C:\wamp64\bin\apache\apache2.4.37\conf\extra
I read that file using the LFI
We can see that there is a new domain monerosandbox.katana.wizard
and also there is a folder name /scannerformonero
.