Devel
HTB - 4. Devel
nmap -T4 -p- -A 10.10.10.5
shows 22 (FTP) with anonymous login (to webroot directory?), 80 (HTTP) with Microsoft IIS httpd 7.5Go to
10.10.10.5
which is a default web pagedirbuster
(dirb
andgobuster
popular as well) withhttp://10.10.10.5:80
, wordlist/usr/share/wordlists/dirbuster/directory-list-2.3-small.txt
, and change file-extension toasm, asmx, asp, aspx, txt
because server is IISFTP: upload file to server
Go to
10.10.10.5/dog.jpg
and it executes.msfvenom
Create
reverse_tcp
payload:Open up port to listen on:
Back to FTP
Go to
10.10.10.5/ex.aspx
and shell poppedHacked
Result: We are
IIS APPPOOL\Web
not authority system.getsystem
failed.Check to see which privilege escalation exploits might work:
Run privilege escalation
Result: Shell popped with authority system
Last updated