IIS Tilde Enumeration
π― Objective: Exploit IIS short filename vulnerability to discover hidden files and directories using 8.3 format enumeration.
Overview
IIS Tilde Enumeration exploits a vulnerability in Microsoft IIS servers where 8.3 short filenames can be discovered using the tilde (~) character. This technique reveals hidden files and directories that may not be accessible through normal browsing.
HTB Academy Lab Solution
Lab: Full Filename Discovery
Question: "What is the full .aspx filename that Gobuster identified?"
Step 1: Service Discovery
# Nmap scan to identify IIS
nmap -p- -sV -sC --open TARGET
# Expected result: Microsoft IIS httpd 7.5 on port 80Step 2: Tilde Enumeration
# Download IIS-ShortName-Scanner
# https://github.com/lijiejie/IIS_shortname_Scanner
# Run automated tilde enumeration
java -jar iis_shortname_scanner.jar 0 5 http://TARGET/
# Expected findings:
# - ASPNET~1 (directory)
# - UPLOAD~1 (directory)
# - TRANSF~1.ASP (file)Step 3: Wordlist Generation
Step 4: Full Filename Discovery
Expected Answer: Full filename starting with "transf" with .aspx extension (extract from Gobuster output)
Technical Details
8.3 Short Filename Format
Enumeration Process
Vulnerable IIS Versions
IIS 7.5 and earlier versions
Windows Server 2008 and older
Servers with 8.3 filename generation enabled
Attack Methodology
1. Automated Discovery
2. Custom Wordlist Creation
3. Full Name Brute Force
Impact & Findings
Common Discoveries:
π Hidden directories (admin panels, backup folders)
π Sensitive files (config files, source code)
π§ Development resources (test pages, debug info)
π Documentation (internal docs, manuals)
Attack Chain:
Short name discovery β Identify hidden resources
Full name enumeration β Access complete filenames
Content analysis β Extract sensitive information
Further exploitation β Use discovered resources for deeper access
π‘ Pro Tip: IIS Tilde Enumeration is particularly effective against legacy Windows servers and can reveal administrative interfaces, backup files, and development resources not visible through standard directory enumeration.
Last updated