🌐Web Enumeration & Exploitation

🎯 Overview

Web applications present the largest attack surface during External Penetration Tests. Focus on high-risk vulnerabilities (RCE, data exposure) rather than minor issues. Use EyeWitness for efficient application discovery and systematic testing of each discovered service.

πŸ” Web Application Discovery

πŸ“Š EyeWitness Automation

# Subdomain list preparation
cat > ilfreight_subdomains << EOF
inlanefreight.local
blog.inlanefreight.local
careers.inlanefreight.local
dev.inlanefreight.local
gitlab.inlanefreight.local
ir.inlanefreight.local
status.inlanefreight.local
support.inlanefreight.local
tracking.inlanefreight.local
vpn.inlanefreight.local
monitoring.inlanefreight.local
EOF

# Automated screenshot capture
eyewitness -f ilfreight_subdomains -d ILFREIGHT_subdomain_EyeWitness

🌐 Application-by-Application Analysis

πŸ“ blog.inlanefreight.local - Drupal 9

πŸ’Ό careers.inlanefreight.local - Job Portal

πŸ”§ dev.inlanefreight.local - Key Vault

πŸ”Ί Unrestricted File Upload Chain

πŸ’° ir.inlanefreight.local - WordPress

🎫 support.inlanefreight.local - IT Support Portal

πŸ“¦ tracking.inlanefreight.local - PDF Generator

πŸ” vpn.inlanefreight.local - Fortinet SSL VPN

🦊 gitlab.inlanefreight.local - GitLab Instance

πŸ›’ shopdev2.inlanefreight.local - Shopping Cart

πŸ“Š monitoring.inlanefreight.local - Monitoring Console

🎯 Key Vulnerabilities Discovered

πŸ”΄ High Risk Findings

🟑 Medium Risk Findings

πŸš€ Attack Chain Summary

🎯 External β†’ Internal Pivot Path

πŸ”§ Tools & Techniques Used

🌐 Web Enumeration

βš”οΈ Exploitation Techniques

🎯 HTB Academy Labs

πŸ“‹ Lab Solutions Summary

πŸ” Key Learning Points

πŸ›‘οΈ Defensive Recommendations

πŸ”’ Application Security

Last updated