To access material, start machines and answer questions login.
is installed on virtually every Windows Server running a web application, intranet portal, or . Unlike standalone web servers, is tightly integrated with Windows authentication, Active Directory, and the .NET runtime, which makes it a high-value initial access target.
The Lazarus Group exploited servers in 2023 to gain initial access and distribute malware (AhnLab ASEC, 2023 (opens in new tab)). HAFNIUM deployed ASPX web shells on during the Exchange ProxyLogon (opens in new tab) campaign in 2021. CISA Advisory AA23-074A (opens in new tab) documented multiple threat actors, including an group, exploiting a .NET deserialization vulnerability (-2019-18935) in Progress Telerik UI components hosted on U.S. government servers. The actors achieved remote code execution through w3wp.exe and dropped malicious DLLs for persistence. IIS misconfigurations and unpatched CVEs remain active attack surfaces across all these incidents.
This room is a continuation of our previous Web Server Attacks room, where we have gone through different servers deployable on an Ubuntu host. This room walks through the IIS attack chain from start to finish: fingerprinting the server, enumerating hidden files through a Windows quirk, uploading a shell through a misconfigured WebDAV directory, and identifying common server misconfigurations that require no exploit code.
Learning Objectives
- Fingerprint an IIS server to determine its version and enabled features
- Use IIS tilde enumeration to discover hidden files and directories
- Exploit a misconfigured WebDAV installation to upload and execute an ASPX command shell
- Understand how ASPX web shells work and what access they provide
- Learn automation techniques to fingerprint and enumerate an IIS server
Prerequisites
- How HTTP requests and responses work, including headers, methods, and status codes (HTTP in Detail room)
- Comfortably running tools from a Kali or AttackBox terminal (Linux Shells room)
- Understanding of IP addresses, ports, and TCP connections (Networking Essentials room)
Machine Access
Start the machine by clicking the Start Machine button below. Allow 2-3 minutes for to start fully, then access it using your AttackBox.
Set up your virtual environment
I have deployed the virtual machines!
Ready to learn Cyber Security?
The Web Server Attacks - II room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in