Grandpa

Overview

Initial Exploit : Microsoft IIS 6.0 Webdav Exploit

Privilege Escation : Abuse SeImpersonatePrivilege Token or Kernel Exploit

Enumeration

Run full port scan on the target

Port Scanning

Port 80 was running vulnerable version of IIS 6.0

The scan shows that the HTTP PUT method is allowed. This could potentially give us the ability to save files on the web server. Since this is an IIS Microsoft web server, the type of files it executes are ASP and ASPX. So let’s check if we’re allowed to upload these file extensions.

We were unable to put files on web server

Lets search this version on google

We got some exploits we also know webdav is enabled on this website

Summary

Microsoft IIS 6.0 was vulnerable to Remote Exploit

Exploitation

We got a working exploit from github

Lets use this exploit to get reverse shell

We got reverse shell using this exploit

Privilege Escalation

After getting shell of service account we will first check for permissions using whoami /priv cmd

Refer to Granny box for exploitation of this token

Last updated