http

Looking at page

At port 8080:

At port 113:

At port 113 we can see that there is FreeBSD identd.

FreeBSD's identd is a server that implements the IDENT user identification protocol. This protocol allows one system to prove its identity to another system over a network connection.

At port 10000:

This basic hellow world text.

Looking at hidden directory.

At Port 80:

At port 10000:

Exploiting:

I tried to log in to page with the default password as admin:admin . Also I got login successcully.

As soon as I get login, I askes me to change the password. Let's change password to P@ssw0rd123!.

Got the first page as shown Below:

There is no project avaialble currently.

Also there is no activity record avaialble.

Click on Administrator and then on information. You will see that there is version-related information.

I found one exploit related to Redmine SCM arbitrary code execution.

Not working.

Last updated

Was this helpful?