msfvenom,metasploit
Last updated
Last updated
First use the davtest command to check which format of files does the server support
In this case the server supports .asp files also so generate a payload using msfvenom
Use cadaver
to upload the generated shell.asp
payload to the /webdav
directory
Before executing the shell.asp
, setup a listener/handler that will receive the reverse connection from the target and send the stage that provides with a meterpreter
session when executed.
Open a new terminal tab and run Metasploit with database support
Setup a , using the same payload, LHOST, LPORT provided to msfvenom
Open the http://10.4.18.218/webdav
link in the browser and click on shell.asp
file
The Meterpreter session will be opened
Use cadaver to delete the shell.asp
uploaded file
you will be provided with a meterpreter session
Use Metasploit module to get a meterpreter
session on the target system.