Grandpa
Last updated
Was this helpful?
Last updated
Was this helpful?
Initial Exploit : Microsoft IIS 6.0 Webdav Exploit
Privilege Escation : Abuse SeImpersonatePrivilege Token or Kernel Exploit
Run full port scan on the target
Port 80 was running vulnerable version of IIS 6.0
The scan shows that the HTTP PUT method is allowed. This could potentially give us the ability to save files on the web server. Since this is an IIS Microsoft web server, the type of files it executes are ASP and ASPX. So let’s check if we’re allowed to upload these file extensions.
We were unable to put files on web server
Lets search this version on google
We got some exploits we also know webdav is enabled on this website
Microsoft IIS 6.0 was vulnerable to Remote Exploit
We got a working exploit from github
Lets use this exploit to get reverse shell
We got reverse shell using this exploit
After getting shell of service account we will first check for permissions using whoami /priv cmd
Refer to Granny box for exploitation of this token