27.Other-notable-applications

1. Methodology over Specific Tools

  • The core focus is on teaching a methodology that can be applied to various applications, not just the ones explicitly covered.

2. Comprehensive Enumeration

  • Thorough network enumeration and application discovery are crucial for identifying potential attack vectors.

  • Tools like EyeWitness create visual representations of web applications and help identify multiple systems.

3. Adaptability and Persistence

  • Penetration testers must be adaptable and persistent, as they will encounter many unknown applications.

  • Digging through scan data and filtering out noise can reveal hidden vulnerabilities.

4. Abuse of Built-in Functionality

  • Many applications have built-in features that can be abused for malicious purposes.

  • Default credentials remain a common vulnerability.

5. Understanding Application Logic

  • Understanding how an application works is essential to discovering vulnerabilities.


Notable Applications and Vulnerabilities

1. Axis2

  • Similar to Tomcat, it can be vulnerable to weak/default credentials.

  • Remote Code Execution (RCE) can be achieved by uploading a webshell as an AAR file.

2. WebSphere

  • Historically vulnerable to various exploits.

  • Default credentials (system:manager) can lead to RCE via WAR file deployment.

3. Elasticsearch

  • Known for past vulnerabilities.

  • Older, forgotten installations can still be vulnerable.

4. Zabbix

  • Vulnerable to SQL injection, authentication bypass, XSS, LDAP password disclosure, and RCE.

  • Its API can also be abused for RCE.

5. Nagios

  • Vulnerable to RCE, privilege escalation, SQL injection, code injection, and XSS.

  • Default credentials (nagiosadmin:PASSW0RD) are common.

6. WebLogic

  • Java EE application server with numerous CVEs, including unauthenticated RCE exploits.

7. Wikis/Intranets (MediaWiki, SharePoint, etc.)

  • Vulnerable to known exploits and document repository issues.

  • Search functionalities can lead to credential disclosure.

8. DotNetNuke (DNN)

  • Vulnerable to authentication bypass, directory traversal, XSS, file upload bypass, and arbitrary file download.

9. vCenter

  • Used to manage ESXi instances.

  • Vulnerable to weak credentials and exploits like Apache Struts 2 RCE and OVA file upload vulnerabilities.

  • Windows vCenter appliances are vulnerable to privilege escalation.


Key Takeaways

  • Default credentials are a significant vulnerability across many applications.

  • Built-in application functionality can often be abused.

  • A thorough methodology and an adaptable mindset are essential for successful penetration testing.

  • Always check for known CVEs.

  • Always check for default credentials.

  • Understanding application logic is a key factor in finding vulnerabilities.

Last updated