# Grandpa

## Grandpa - 10.10.10.14

### Target Enumeration:

OS: Windows

IP: 10.10.10.14

User: bdff5ec67c3cff017f2bedc146a5d869

Root: 9359e905a2c35f861f6a57cecf28bb7b

### Ports / Services / Software Versions Running

80/tcp open  http Microsoft IIS httpd 6.0

### Vulnerability Exploited:

Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in Internet Information Services (IIS) 6.0 in Microsoft Windows Server 2003 R2 allows remote attackers to execute arbitrary code via a long header beginning with "If: \<http\://" in a PROPFIND request, as exploited in the wild in July or August 2016. Original exploit by Zhiniang Peng and Chen Wu.

### Exploiting the host:

Searchsploit results for IIS 6.0

![](https://lh4.googleusercontent.com/IWQvp_Nx1TFrLyWNxazzE69X4VP2iedBeRC5wOo__5sAgYEjUS6GKPYCu17riQNfkZKbnAWNJjgR0OsLkV-XGXpvw1R9kxx4_SB2YwWvcFk0HlbtLq5bkMYqFzwTloWaWtENwC3Z)

Use windows/iis/iis\_webdav\_scstoragepathfromurl

![](https://lh5.googleusercontent.com/T6DQwBXZs2bn0IF8xo_0KboBvympBn3Ocr1SQdhuUAfoHwm7l1Z2tqsmv8-nSMEH4yxJ6v7BQta7W4UWdYVZxFWLjgeIaxzPRNToCrUlb_O5kZlEWxRAJnR7Vb5K6bzLxOTMNn5d)

Execute the exploit.

![](https://lh5.googleusercontent.com/3I4TczTaSvr-HNRNZ68OzBMQe-zYMCP9QAwSIwdOUNJG8T_4LinVpbBRpDnhdyG4rUEY1Ii9H3L76o7IdEwJZcbbi43N2ZZUqDLjpB87tqTfscrBuHdFir40VQvHv1hvcJXkhUSw)

Collect your flags.

![](https://lh4.googleusercontent.com/W1ccQqDUptM_Rfng-_3Vu1qSZF9jM8r2Y-yE7AWcMCTQGjEq9wnfDKjzz0mbl59tFvCEZNL0U5hxucKcIKbzG4f6kHnVksiK9CfYFReEoFZTpg-AAsDTy_iY2OT23YUQnMcO71w5)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://www.jdksec.com/hack-the-box/grandpa.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
