Granny
Last updated
Was this helpful?
Last updated
Was this helpful?
Initial Foothold : Microsoft IIS 6.0 Exploitation
Privilege Escalation :
Starting with port scanning
From Full nmap scan we got that port 80 was running Microsoft IIS 6.0
We can also observe that PUT method is allowed from which we can put files on the webserver
Test this functionality using davtest command
From the above result it has been confirmed that we can put files on the server
Confirm that my executing the file
We also found exploit for IIS 6.0 WebServer
Files can be uploaded on webserver
Exploits are available for Vulnerable WebServer
Use exploit from github for exploiting this Vulnerabilty
Launch Listener on port 4444
Execute the exploit
Exploit Completed Successfully and we got shell
Using curl we will put webshell on the server
But we can't put aspx files on the webserver directly
so first put text file on the server and then change the move the file to aspx format using MOVE functionality which is allowed
First PUT text format of cmdasp.aspx on the webserver using curl
Now again use curl command to MOVE file from cmdasp.txt to cmdasp.aspx
Got webshell command execution.
Lets try to get reverse shell
First generate reverse shell payload using msfvenom
Then upload the shell using the above method
We got back the reverse shell
After getting shell of service account always check the privileges of the service account
In this case SeImpersonatePrivilege was enabled which we can exploit to gain system shell
Lets use Churrasco.exe exploit from below github repo
Transfer this binary along with reverse shell binary to target host using ftp
After trying many other methods of transfer the exploit ftp successfully uploaded the exploit
Create a text file in windows target which contains
Now execute this in ftp using
this downloaded the required files on the target host
Got the system shell
Thats all for this box.
Good Bye :)