Workflow platform(Processmaker)
Exploit a vulnerable ProcessMaker server with Metasploit
nmap -sS -sV 10.2.27.180/tcp open http Apache httpd 2.2.23 ((Win32) PHP/5.2.14)
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
445/tcp open microsoft-ds Microsoft Windows Server 2008 R2 - 2012 microsoft-ds
3306/tcp open mysql MySQL (unauthorized)
3389/tcp open ssl/ms-wbt-server?
49152/tcp open msrpc Microsoft Windows RPC
49153/tcp open msrpc Microsoft Windows RPC
49154/tcp open msrpc Microsoft Windows RPC
49155/tcp open msrpc Microsoft Windows RPC
49156/tcp open msrpc Microsoft Windows RPC
Service Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windowsEnumeration
Explore the web application hosted on the web server, before running any vuln scanners
firefox 10.2.27.1
View the web page source code. In this case no version information can be found.
Search online for
ProcessMakerdefault credentialsadmin:admin

Exploitation

Last updated