Skip to content

Kevin 🔹

Enumeration

The web server at port 80 welcomes us with a login form. Trying admin:admin hits the jackpot.

This is an HP Power Manager 4.2 (Build 7).

Initial Access

Use this exploit: https://github.com/Muhammd/HP-Power-Manager/blob/master/hpm_exploit.py

Execute it with the machine IP.

Post Exploitation

Get the flag.