IIS Tilde Enumeration

🎯 Objective: Exploit IIS short filename vulnerability to discover hidden files and directories using 8.3 format enumeration.

Overview

IIS Tilde Enumeration exploits a vulnerability in Microsoft IIS servers where 8.3 short filenames can be discovered using the tilde (~) character. This technique reveals hidden files and directories that may not be accessible through normal browsing.


HTB Academy Lab Solution

Lab: Full Filename Discovery

Question: "What is the full .aspx filename that Gobuster identified?"

Step 1: Service Discovery

# Nmap scan to identify IIS
nmap -p- -sV -sC --open TARGET

# Expected result: Microsoft IIS httpd 7.5 on port 80

Step 2: Tilde Enumeration

# Download IIS-ShortName-Scanner
# https://github.com/lijiejie/IIS_shortname_Scanner

# Run automated tilde enumeration
java -jar iis_shortname_scanner.jar 0 5 http://TARGET/

# Expected findings:
# - ASPNET~1 (directory)
# - UPLOAD~1 (directory)  
# - TRANSF~1.ASP (file)

Step 3: Wordlist Generation

Step 4: Full Filename Discovery

Expected Answer: Full filename starting with "transf" with .aspx extension (extract from Gobuster output)


Technical Details

8.3 Short Filename Format

Enumeration Process

Vulnerable IIS Versions

  • IIS 7.5 and earlier versions

  • Windows Server 2008 and older

  • Servers with 8.3 filename generation enabled


Attack Methodology

1. Automated Discovery

2. Custom Wordlist Creation

3. Full Name Brute Force


Impact & Findings

Common Discoveries:

  • πŸ“ Hidden directories (admin panels, backup folders)

  • πŸ“„ Sensitive files (config files, source code)

  • πŸ”§ Development resources (test pages, debug info)

  • πŸ“ Documentation (internal docs, manuals)

Attack Chain:

  1. Short name discovery β†’ Identify hidden resources

  2. Full name enumeration β†’ Access complete filenames

  3. Content analysis β†’ Extract sensitive information

  4. Further exploitation β†’ Use discovered resources for deeper access

πŸ’‘ Pro Tip: IIS Tilde Enumeration is particularly effective against legacy Windows servers and can reveal administrative interfaces, backup files, and development resources not visible through standard directory enumeration.

Last updated