Bounty
Recon
nmap_scan.log
Open 10.129.97.182:80
[~] Starting Script(s)
[>] Running script "nmap -vvv -p {{port}} {{ip}} -vvv -sV -sC -Pn" on ip 10.129.97.182
PORT STATE SERVICE REASON VERSION
80/tcp open http syn-ack Microsoft IIS httpd 7.5
| http-methods:
| Supported Methods: OPTIONS TRACE GET HEAD POST
|_ Potentially risky methods: TRACE
|_http-title: Bounty
|_http-server-header: Microsoft-IIS/7.5
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windowsHTTP (80)

Backend is IIS server, version 7.5

All the pages give 403 - Forbidden: Access is denied.
We can fuzz for file extensions, since webserver is IIS it's probably using ASP[X] files.
Upload Form
Uploading JPG worked, but ASPX not.

Fuzzing with /usr/share/seclists/Discovery/Web-Content/web-extensions.txt wordlist returns no valid result, looks like only images are valid (?)

*.aspx files return different output 🤔

web.config RCE
web.config RCEWe are able to upload *.config files.

Reverse Shell (merlin)
Get a reverse shell
Privilege Escalation
SeImpersonatePrivilege privilege stands out.
Because dotnet isn't install I think that's why efs kept failing.
https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation/juicypotatohttps://github.com/ohpe/juicy-potatohttps://github.com/ohpe/juicy-potato/releases/tag/v0.1
Adding this user to Administrators yielded no successes for whatever reason..
Reverse shell was too much overhead, but ended up doing it
Flags
Note: The user flag was hidden.
-forceto show hidden files with powershell, but that also shows every hidden file.
Last updated