Day 18/100 of #cybertechdave100daysofcyberchallenge - IIS and WebDAV
Today we will continue from yesterday and show one of many ways to exploit a vulnerability in IIS respectively WebDAV
What is IIS and what does it stand for?
It is an extensible web server software developed by Microsoft for the Windows NT family. And IIS stands for Internet Information Service.
What is the meaning of WebDAV mentioned in the intro?
How could a possible exploitation process look like?
How do we identify the service?
Here Nmap and in particular a nmap script was introduced as a technique:
Nmap -sV -p 80,443 -script=http-enum <ip>
Let's try to brute-force credentials with the tool "hydra" already used several times:
Note:
Once we have succeeded with our brute-force attack and obtained a valid set of credentials, we can use the following tools to simplify our exploitation process:
领英推荐
The first tool is "davtest“ (https://www.kali.org/tools/davtest/)
Test if an authentication has to be done:
Perform a series of tests, including: creating a directory, uploading different file types, testing which file types can be executed on the server:
Note:
We then continue with "cadaver" (https://www.kali.org/tools/cadaver/):
We use the tool as follows:
Authenticate to WebDAV:
Upload a webhell (for example one provided on Kali)
And that's it for today. :)