Example
(1) Using sc.exe
sc.exe 1. SSH into the intermediary server (with the first set of low-privileged credentials)
2. Craft the reverse shell payload (msfvenom) and upload it to the IIS server (with admin credentials)
msfvenom) and upload it to the IIS server (with admin credentials)3. Spawn a remote /netonly shell session on the intermediate server (as the admin)
/netonly shell session on the intermediate server (as the admin) 4. Start a service (sc.exe) on the IIS server that automatically executes the uploaded reverse shell payload
sc.exe) on the IIS server that automatically executes the uploaded reverse shell payload(2) Using schtasks
schtasks 1. SSH into the intermediary server, craft the reverse shell payload and upload to the IIS server
2. Create and start a task (schtasks) on the target IIS machine that executes the uploaded reverse shell payload
schtasks) on the target IIS machine that executes the uploaded reverse shell payloadWhat we can learn
Last updated