As you see endgame type consists of more than one machine connected to each other and the flags are devided on specific steps..
1. Enumeration:
Nmap:
$ nmap -sV -sC -A 10.13.38.11 -Pn
Web Enumeration:
PORT 80
iis default page..
Nikto:
simple web vuln scanner
$ nikto -h 10.13.38.11
nikto revealed a .DS_Store file in the server’s root folder.
The DS_Store, or
Desktop Services Store is a hidden file use by Mac OS X. This file is used to store various
attributes about the folder such as icons or sub-folder names. This file can reveal sensitive
information such as the folder structure and contained files.
visiting http://10.13.38.11/.DS_Store
we can use this DS_walk tool to enumeate the files
Usage:
$ python ds_walk.py -u http://10.13.38.11/
The interesting ones > /admin , /dev and their sub-dirctories
They all give this inaccessible error
admin gives login prompt and unauthorized access
Let’s save these results and continue with enumeration..
IIS short name enumeration:
Searching about iis v 7.5 vulnerabilities and misconfigurations found this paper or this article about iis tilde character ~
which reveals files and folders names and also extentions
we can use a metasploit module for this or this github tool