80
Last updated
Last updated
There is a login page:
Now using burp to intercept
It is a post request so we can use hydra now to bruteforce.
Then using hydra to bruteforce:
We have a password.
Now we can use this exploit: Run a listener:
Message.exe seems to be running repeatedly.
Now crafting a msfvenom payload:
Now we can rename the original binary to Message.bak and transfer our new binary:
Now run a listener:
Now we can login and check version in about section: Now we can search for exploits:
Go to http://10.11.103.226/admin/app/editor/editpost.cshtml Now upload the file as PostView.ascx: Now visit http://10.10.248.167/?theme=../../App_Data/files We get a shell back:
We are iis apppool\blog
Running winpeas: C:\Program Files (x86)\SystemScheduler
is suspicious.\
In Events: There is a log.
Viewing the logs
We are administrator.