Granny
Personal Rating: Hard
I had to rate this hard because I did not know how to exploit the webserver manually and how to do the privilege escalation without metasploit at the time of doing the box.
Enumeration
Running an initial nmap scan:
sudo nmap -sV -sC <IP>
IIS RCE w/ Metasploit
This was the module that gave me a shell as IIS, which could be found after some research about the IIS version: windows/local/ms16_016_webdav
The way to do the privilege escalation was to migrate to another process running as system using metasploit. I am not sure how to do this manually as of now.
NOTE: I could have enumerated the host manually and would have found several privilege escalation vulnerabilies working, like this one: ms15_051. Scripts like winPEASS would have helped with that a lot.
Last updated