IIS
Fuzzing
/trace.axd
/trace.axd?id=1
/admin/help.cgi
/admin/help.cgi.bak
/admin/WS_FTP.LOG
/adovbs.inc
/confirm.asp.bak
/default.asp.bak
/login.asp.bak
/pindex.asp.bak
/rootlogin.asp.bak
/rootlogin.asp.old
/_vti_pvt/service.cnf
/include/common.inc
/WS_FTP.LOG
/service.cnf
/_vti_pvt/service.cnf
/aspnet_client
/global.asax
/msdeploy.axd
/msdeploy.axd <-- check CVE-2025-53772Wordlists
trace.axd enable
Information leak
Information disclosure
Try
Often discloses info.
PUT methode enabled
Try uploading .aspx webshell or web.config
Insecure Upload File
Try to upload web.config
Website using PHP
It is possible to use “filename=”web<<“” in the file upload request. If “web**” replaces another file in the same directory (for example web.aspx), another combination can be used such as “filename=”web<<>fig”” or “filename=’web”config’”.
web.config or web.xml
Viewstate
Internal IP disclosure
Tilde Enumeration
Assume the server contains a hidden directory named SecretDocuments. When a request is sent to http://example.com/~s, the server replies with a 200 OK status code, revealing a directory with a short name beginning with "s"
Once the short name secret~1 is identified, enumeration of specific file names within that path can be performed, potentially exposing sensitive documents
The same IIS tilde directory enumeration technique can also detect 8.3 short file names for files within the directory.
If two files named somefile.txt and somefile1.txt exist in the same directory, their 8.3 short file names would be:
somefi~1.txtforsomefile.txtsomefi~2.txtforsomefile1.txt
IIs Tilde Enumration Scanner - Burp Extension


Nuclei Template
https://github.com/coffinxp/priv8-Nuclei/blob/main/iis.yaml
ShortScan
IIS ShortName Scanner

Upon executing the tool, it discovers 2 directories and 3 files. However, the target does not permit GET access to http://10.129.204.231/TRANSF~1.ASP, necessitating the brute-forcing of the remaining filename.
Or:
Generate Wordlist
Fuzzing
XSS
See XSS Page - ASP part
XSSCVE-2025-53772 IIS WebDeploy RCE
Sending this payload in an HTTP POST to /msdeploy.axd results in calc.exe launching on the server.
Resources
Script to configure IIS
Privilege Escalation
To get an HTTP coerce of the machine account

than relay to Ldap and :
start_tls + add a computer to the domain + RBCD or
shadow credentials
Example with RBCD :

Shell as admin:

Credit: M4fly
Interesting Books
Interesting BooksThe Web Application Hacker’s Handbook The go-to manual for web app pentesters. Covers XSS, SQLi, logic flaws, and more
Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities Learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them
Real-World Bug Hunting: A Field Guide to Web Hacking Learn about the most common types of bugs like cross-site scripting, insecure direct object references, and server-side request forgery.
Last updated