Windows: IIS Server: WebDav Metasploit

Lab Environment

In this lab environment, you will be provided with GUI access to a Kali machine. The target machine will be accessible at demo.ine.local.

Objective: Exploit the WebDAV service and retrieve the flag!

The following username and password may be used to access the service:

Username

Password

bob

password_123321

Tools

  • Metasploit

  • DAVTest

  • Cadaver

Writeup

davtest -url http://demo.ine.local/webdav -auth bob:password_123321

Last updated