← Back to Pakistan Cyber Tour

Annex 06 — Exposed Admin Panels

Pakistan OSINT Operation — 01 March 2026 — 2 federal government admin panels, no WAF

Two Pakistani federal government websites expose their administrative login panels directly to the internet during an active military conflict — with no Web Application Firewall, no IP restriction, no rate limiting, and no CAPTCHA.

Both panels are directly accessible from the internet with no protective measures. During wartime, when most government infrastructure is offline, these endpoints remain exposed — suggesting they were either forgotten in the defensive shutdown or deemed non-critical.

Target 1: FSP.GOV.PK — Food Security Portal

FieldValue
URLhttps://fsp.gov.pk/AdminLogin
Title"Admin Dashboard - Login"
ServerApache
Page Size4,480 bytes
Auth MethodPOST form (username + password)
HTTPSYes
WAFNONE
CAPTCHANONE
Rate LimitingNOT OBSERVED

Behavior Analysis

The main site (fsp.gov.pk) exhibits soft-404 behavior — most paths return HTTP 200 with a 428-byte response. /AdminLogin is a distinct real page (4,480 bytes) with a functioning login form. This confirms the admin panel is intentionally deployed at this path but unprotected from public access.

Ministry Context

The Ministry of National Food Security & Research oversees:

Compromise of this admin panel could expose national food supply chain data and policy decisions.

Target 2: EP.GOV.PK — Pakistan Post EMTTS

FieldValue
URLhttps://ep.gov.pk/hq/locationissue.asp
Title"Admin Login"
ServerMicrosoft-IIS/10.0
Powered ByASP.NET
Page Size17,340 bytes
Auth MethodPOST form (username + password)
HTTPSYes
WAFNONE

Additional Endpoints Discovered

PathStatusSizeDescription
/20021,871 bytesEMTTS Homepage
/hq/2006,241 bytes"header1" — partial admin interface
/hq/locationissue.asp20017,340 bytesAdmin Login
/track/200583 bytesTracking endpoint
/trace.axd403ASP.NET tracing ENABLED (403, not 404)
/aspnet_client/403Client-side script directory exists
ASP.NET Trace Exposure: /trace.axd returns 403 "Trace Error" rather than 404. This indicates ASP.NET request tracing is enabled on the server. A misconfiguration or bypass could expose full request/response data including authentication tokens.

Pakistan Post Context

Pakistan Post operates Express Mail Service (EMS), track and trace systems for domestic/international parcels, money order services, and HQ administrative operations. The admin panel at /hq/locationissue.asp manages HQ-level operations including location/branch management.

University Admin Panels (Additional)

URLSizeDescriptionAuth Required
qau.edu.pk/admin/94 KB"Administration Section — QAU"NONE
pu.edu.pk/admin/82 KBUniversity administrative sectionNONE (HTTP 200)

Attack Vectors

Attack TypeFSPEP (Pakistan Post)Risk
Brute ForcePossible (no CAPTCHA)PossibleHIGH
Credential StuffingPossiblePossibleHIGH
Password SprayingPossiblePossibleHIGH
SQL Injection (login form)UntestedUntestedMEDIUM
ASP.NET Trace EnumerationN/APossible (/trace.axd)MEDIUM
ViewState DeserializationN/APossible (ASP.NET)MEDIUM