80

There is a login page:

Now using burp to intercept

It is a post request so we can use hydra now to bruteforce.

Then using hydra to bruteforce:

We have a password.

Now we can login and check version in about section: Now we can search for exploits:

Now we can use this exploit: Run a listener:

Go to http://10.11.103.226/admin/app/editor/editpost.cshtml Now upload the file as PostView.ascx: Now visit http://10.10.248.167/?theme=../../App_Data/files We get a shell back:

We are iis apppool\blog Running winpeas: C:\Program Files (x86)\SystemScheduler is suspicious.\

In Events: There is a log.

Viewing the logs

Message.exe seems to be running repeatedly.

Now crafting a msfvenom payload:

Now we can rename the original binary to Message.bak and transfer our new binary:

Now run a listener:

We are administrator.

Last updated

Was this helpful?