IIS

Fuzzing

/trace.axd
/trace.axd?id=1
/admin/help.cgi
/admin/help.cgi.bak
/admin/WS_FTP.LOG
/adovbs.inc
/confirm.asp.bak 
/default.asp.bak
/login.asp.bak
/pindex.asp.bak
/rootlogin.asp.bak
/rootlogin.asp.old
/_vti_pvt/service.cnf 
/include/common.inc
/WS_FTP.LOG
/service.cnf
/_vti_pvt/service.cnf
/aspnet_client
/global.asax
/msdeploy.axd
/msdeploy.axd <-- check CVE-2025-53772

Wordlists

trace.axd enable

Information leak

Information disclosure

Try

Often discloses info.

PUT methode enabled

Try uploading .aspx webshell or web.config

Insecure Upload File

Try to upload web.config

Website using PHP

It is possible to use “filename=”web<<“” in the file upload request. If “web**” replaces another file in the same directory (for example web.aspx), another combination can be used such as “filename=”web<<>fig”” or “filename=’web”config’”.

web.config or web.xml

Viewstate

Internal IP disclosure

Tilde Enumeration

Assume the server contains a hidden directory named SecretDocuments. When a request is sent to http://example.com/~s, the server replies with a 200 OK status code, revealing a directory with a short name beginning with "s"

Once the short name secret~1 is identified, enumeration of specific file names within that path can be performed, potentially exposing sensitive documents

The same IIS tilde directory enumeration technique can also detect 8.3 short file names for files within the directory.

If two files named somefile.txt and somefile1.txt exist in the same directory, their 8.3 short file names would be:

  • somefi~1.txt for somefile.txt

  • somefi~2.txt for somefile1.txt

IIs Tilde Enumration Scanner - Burp Extension

Nuclei Template

https://github.com/coffinxp/priv8-Nuclei/blob/main/iis.yaml

ShortScan

IIS ShortName Scanner

Upon executing the tool, it discovers 2 directories and 3 files. However, the target does not permit GET access to http://10.129.204.231/TRANSF~1.ASP, necessitating the brute-forcing of the remaining filename.

Or:

Generate Wordlist

Fuzzing

XSS

See XSS Page - ASP part

XSS

CVE-2025-53772 IIS WebDeploy RCE

Sending this payload in an HTTP POST to /msdeploy.axd results in calc.exe launching on the server.

Resources

Script to configure IIS

Privilege Escalation

To get an HTTP coerce of the machine account

than relay to Ldap and :

  • start_tls + add a computer to the domain + RBCD or

  • shadow credentials

Example with RBCD :

Shell as admin:

Credit: M4fly

Interesting Books

Interesting Books

Disclaimer: As an Amazon Associate, I earn from qualifying purchases. This helps support this GitBook project at no extra cost to you.

Last updated