Pentest Chronicles
The application returns the following response:
The header reveals information that the application is running in a Windows environment, using Apache server 2.4.58 and PHP version 8.1.12. Both versions are not up to date.
The next step was finding the standard version control system configuration file at the address https://intranet.[REDACTED].com/[REDACTED]/.git/config:
The above indicates not only the fact of storing the application source code on GitHub, but also provides a potential possibility of gaining access to the application source code. Phase #2 – Accessing the source code Access to the .git directory may in some cases allow obtaining access to the source code, specific changes and their descriptions or similar. To this end, the Dumper and Extractor tools from the GitTools package were used. First, it was necessary to download as many files as possible from the .git directory:
Next, the Extractor application allowed for the reconstruction of the application's source code:
Phase #3 – Domain Controller takeover The auditor undertook the analysis of the source code in search of sensitive data. In a short time, the following credentials were identified:
Further analysis showed that the mentioned user is a domain administrator:
With a domain administrator account, it was possible to log in to other computers on the network with administrator privileges, as well as to download the database of all users in the domain and attempt to crack their passwords. The following credentials were found in the next file:
Mr. [REDACTED] is highly likely the author of the Intranet application, his name appears in several places in the code, including the credentials. While this user does not possess administrative privileges, the same password is used for the user adm_[REDACTED], who does hold administrator privileges - providing the auditor with alternative access to the domain in the event of the detection and change of the first password. Phase #4 – Review of the database In the configuration file, it was also possible to find credentials used to connect to the database:
Access is facilitated by the web-accessible phpmyadmin application, which allows for database management: [REDACTED] Using the previously found credentials, it was possible to gain access to the database:
A review of the data contained in the database revealed, among other things, the tbl_documentation_desc table, which contained a large number of plain text passwords for various integrations. The following SQL query was used:
As a result of which, the following list was returned:
Additionally, one entry with a note can be found, in which we find further passwords:
Many of these access points may be potentially interesting for an attacker, however, focusing on further technical network reconnaissance or privilege escalation, access to the Any Desk panel is interesting:
This allows the auditor to remotely manage connected computers:
Additionally, the tbl_users table can be found in the database, containing among other things:
The auditor successfully connected to the VPN using the above configuration, gaining access to additional servers that were not available to a regular agent.
Example host previously inaccessible to the auditor:
One of the key servers was the one located at address 192.168.7.62, on which accounting documents were located, which were downloaded by the auditor:
Examples of found files – presented below. Bank account statements:
CV of employees:
Documents:
Additionally, the accountant's account has high administrative privileges:
Additionally, the following passwords saved in the browser were found (the example below presents only URLs and usernames):
FINAL NOTES Final assessment of the Intranet service indicates that if the system is to remain operational, it requires significant hardening. A critical architectural concern is the current hosting environment; the application must be migrated from the Domain Controller to a dedicated, standalone server running the latest stable software versions.

In today's world, ensuring the security of our accounts is more crucial than ever. Just as keys protect the doors to our homes, passwords serve as the first line of defense for our data and assets. It's easy to assume that technical individuals, such as developers and IT professionals, always use strong, unique passwords to keep ...

SOCMINT is the process of gathering and analyzing the information collected from various social networks, channels and communication groups in order to track down an object, gather as much partial data as possible, and potentially to understand its operation. All this in order to analyze the collected information and to achieve that goal by making …

PyScript – or rather Python in your browser + what can be done with it? A few days ago, the Anaconda project announced the PyScript framework, which allows Python code to be executed directly in the browser. Additionally, it also covers its integration with HTML and JS code. An execution of the Python code in …