80

There is a login page: 
Now using burp to intercept
It is a post request so we can use hydra now to bruteforce.
Then using hydra to bruteforce:

We have a password.
Now we can login and check version in about section:
Now we can search for exploits:

Now we can use this exploit: Run a listener:
Go to http://10.11.103.226/admin/app/editor/editpost.cshtml Now upload the file as PostView.ascx:
Now visit http://10.10.248.167/?theme=../../App_Data/files We get a shell back: 
We are iis apppool\blog Running winpeas:
C:\Program Files (x86)\SystemScheduler is suspicious.\
In Events:
There is a log.
Viewing the logs 
Message.exe seems to be running repeatedly.
Now crafting a msfvenom payload:
Now we can rename the original binary to Message.bak and transfer our new binary:
Now run a listener:
We are administrator.
Last updated
Was this helpful?