Bounty

Recon

chevron-rightnmap_scan.loghashtag
Open 10.129.97.182:80
[~] Starting Script(s)
[>] Running script "nmap -vvv -p {{port}} {{ip}} -vvv -sV -sC -Pn" on ip 10.129.97.182

PORT   STATE SERVICE REASON  VERSION
80/tcp open  http    syn-ack Microsoft IIS httpd 7.5
| http-methods: 
|   Supported Methods: OPTIONS TRACE GET HEAD POST
|_  Potentially risky methods: TRACE
|_http-title: Bounty
|_http-server-header: Microsoft-IIS/7.5
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

HTTP (80)

Writeup.png

Backend is IIS server, version 7.5

Writeup-1.png

All the pages give 403 - Forbidden: Access is denied.

We can fuzz for file extensions, since webserver is IIS it's probably using ASP[X] files.

Upload Form

Uploading JPG worked, but ASPX not.

Writeup-2.png

Fuzzing with /usr/share/seclists/Discovery/Web-Content/web-extensions.txt wordlist returns no valid result, looks like only images are valid (?)

Writeup-3.png

*.aspx files return different output 🤔

Writeup-4.png

web.config RCE

https://book.hacktricks.xyz/network-services-pentesting/pentesting-web/iis-internet-information-services#execute-.config-filesarrow-up-right

We are able to upload *.config files.

Writeup-5.png

Reverse Shell (merlin)

Get a reverse shell

Privilege Escalation

SeImpersonatePrivilege privilege stands out.

https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation/privilege-escalation-abusing-tokens#seimpersonateprivilegearrow-up-right

Because dotnet isn't install I think that's why efs kept failing.

https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation/juicypotatoarrow-up-righthttps://github.com/ohpe/juicy-potatoarrow-up-righthttps://github.com/ohpe/juicy-potato/releases/tag/v0.1arrow-up-right

Adding this user to Administrators yielded no successes for whatever reason..

Reverse shell was too much overhead, but ended up doing it

Flags

Note: The user flag was hidden. -force to show hidden files with powershell, but that also shows every hidden file.

Last updated