
This was a fairly easy box and even though it doesn’t necessarily bring anything new to the table it allows to practice WebDAV exploitation, Windows Kernel Exploits and overall it’s a pretty good machine. This exploit worked and granted a SYSTEM level shell. Session to specify the session to run the module against.RHOSt to specify the target host IP address.Selecting the ms15-051 Client Copy Image exploit, setting the following flags and running the module: Running the local exploit suggester to Metaspoit module to look for exploits, all that is required it to select the session to run the module against Migrating to a more stable and privileged process asp shell to trigger itĪ call back was received which granted a reverse shell Privilege Escalation payload to specify the payload type, in this case the Windows reverse TCP shell.RHOST to specify the target host IP address.Starting MSFconsole, selecting the multi handler module, setting and running the exploit: Then uploading the file first as html and then using the MOVE method to rename it to asp:

-f to specify the format, in this case asp.LPORT to specify the local port to connect to.LHOST to specify the local host IP address to connect to.-p to specify the payload type, in this case the Windows Meterpreter reverse shell.html shell using MSFvenom with the following flags

Using davtest to check whether files can be uploaded to the web server WebDAV Shell Upload ExploitationĬreating an. This could be used to upload a web shell and obtain remote access to the machine.
