Granny

Overview

Initial Foothold : Microsoft IIS 6.0 Exploitation

Privilege Escalation :

Enumeration

Starting with port scanning

Port Scanning

From Full nmap scan we got that port 80 was running Microsoft IIS 6.0

We can also observe that PUT method is allowed from which we can put files on the webserver

Test this functionality using davtest command

From the above result it has been confirmed that we can put files on the server

Confirm that my executing the file

We also found exploit for IIS 6.0 WebServer

Summary

Files can be uploaded on webserver

Exploits are available for Vulnerable WebServer

Exploitation

Using Exploit of IIS 6.0

Use exploit from github for exploiting this Vulnerabilty

Launch Listener on port 4444

Execute the exploit

Exploit Completed Successfully and we got shell

Using PUT method

Using curl we will put webshell on the server

But we can't put aspx files on the webserver directly

so first put text file on the server and then change the move the file to aspx format using MOVE functionality which is allowed

First PUT text format of cmdasp.aspx on the webserver using curl

Now again use curl command to MOVE file from cmdasp.txt to cmdasp.aspx

Got webshell command execution.

Lets try to get reverse shell

First generate reverse shell payload using msfvenom

Then upload the shell using the above method

We got back the reverse shell

Privilege Escalation

After getting shell of service account always check the privileges of the service account

In this case SeImpersonatePrivilege was enabled which we can exploit to gain system shell

Lets use Churrasco.exe exploit from below github repo

Transfer this binary along with reverse shell binary to target host using ftp

After trying many other methods of transfer the exploit ftp successfully uploaded the exploit

Create a text file in windows target which contains

Now execute this in ftp using

this downloaded the required files on the target host

Got the system shell

Thats all for this box.

Good Bye :)

Last updated