Frequently exploited Windows Services
Last updated
Last updated
Default ports
Supported executed files
WebDAV is a protocol that allows you to edit web content on a server using HTTP or HTTPS connections. It has advantages over FTP such as more security options and file locking.
Default ports
Needs legitimate credentials, since it implements authentication in form of a username/password
Enumeration. Identify whether WebDAV has been configured to run on the IIS web server.
Brute-force attack on the WebDAV server in order to identify legitimate credentials that we can use for authentication.
Upload a malicious (like a .asp payload) and execute arbitrary commands or obtain a reverse shell on the target.
davtest -> Used to scan. authenticate and exploit a WebDAV server.
cadaver -> Supports file upload, download, on-screen display, in-place editing, namespace operations (move/copy), collection creation and deletion, property manipulation, and resource locking on WebDAV servers.
nmap deep dive
The address will be http://%IP/webdav/
The most important section of the output, with that we can see that .asp can be executed and we can get our reverse shell wih that
Use kali linux pre-package web shells to upload a file and get access
Folder:
Using the cadaver shell upload the web shell
Go via UI and execute the web shell