Windows: IIS Server: WebDav Metasploit
Last updated
Last updated
In this lab environment, you will be provided with GUI access to a Kali machine. The target machine will be accessible at demo.ine.local.
Objective: Exploit the WebDAV service and retrieve the flag!
The following username and password may be used to access the service:
Username
Password
bob
password_123321
Metasploit
DAVTest
Cadaver