Frequently exploited Windows Services

IIS WebDAV

General information

IIS

  • Default ports

  • Supported executed files

WebDAV

WebDAV is a protocol that allows you to edit web content on a server using HTTP or HTTPS connections. It has advantages over FTP such as more security options and file locking.

  • Default ports

  • Needs legitimate credentials, since it implements authentication in form of a username/password

Steps of exploitation

  1. Enumeration. Identify whether WebDAV has been configured to run on the IIS web server.

  2. Brute-force attack on the WebDAV server in order to identify legitimate credentials that we can use for authentication.

  3. Upload a malicious (like a .asp payload) and execute arbitrary commands or obtain a reverse shell on the target.

Useful tools

  • davtest -> Used to scan. authenticate and exploit a WebDAV server.

  • cadaver -> Supports file upload, download, on-screen display, in-place editing, namespace operations (move/copy), collection creation and deletion, property manipulation, and resource locking on WebDAV servers.

Exploitation

nmap

  • nmap deep dive

Bruteforce the authentication

The address will be http://%IP/webdav/

davtest

  • The most important section of the output, with that we can see that .asp can be executed and we can get our reverse shell wih that

cadaver

  • Use kali linux pre-package web shells to upload a file and get access

Folder:

  • Using the cadaver shell upload the web shell

  • Go via UI and execute the web shell

Last updated