Bounty

OS: Windows, Difficulty: Easy, IP: 10.10.10.93

Initial Enumeration

# Nmap 7.70 scan initiated Thu Jul 18 22:03:22 2019 as: nmap --max-rate 1000 --min-parallelism 1000 -p- -T5 -oN T-all 10.10.10.93
Nmap scan report for 10.10.10.93
Host is up (0.22s latency).
Not shown: 65534 filtered ports
PORT   STATE SERVICE
80/tcp open  http

# Nmap done at Thu Jul 18 22:05:34 2019 -- 1 IP address (1 host up) scanned in 131.98 seconds

Using the following links I was able to get to a working web-shell

web.config code

Now I created a payload to get meterpreter session and uploaded it as shell.exe.config which is allowed by the server and using the web-shell I had, I renamed the file to shell.exe and then ran it.

The shell was a x86 shell so I had to upgrade to x64 shell and then run exploit suggester.

This got me a NT Authority/System Shell

User Own

Root Own

Learning Outcome

Enumerate the web directories and file extensions a little better. Always open up the hidden files on the system as soon as you get a shell to make sure you do not miss anything important.

Last updated

Was this helpful?