HTB: Walkthrough without Metasploit. ~[GRANDPA]

1. Scanning and Enumeration-

doing a basic scan with Nmap will give below results

2. Gaining Initial Access-

using Netcat to create a listener at 1234
root@kali:~# nc -nlvp 1234

3. Privileges escalation-

Mostly we use for windows i.e Windows-Exploit-Suggester

Here we can see both binaries go downloaded from FTP server

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store