Tags:template Related to:note-taking,notes,smb,eternal-bluemicrosoft-ds See also: Index: 🗂️Index of HTB Writeups - index location

Content

Step 1 - Run normal nmap scan, full scan, -sC for default scripts, -sV for service version detection etc

Step 2 - use -script safe scripts to run safe tests that may not be default

Here I ran smb-vuln* scripts as I felt SMB could be vulnerable. Found that it is vulnerable to eternal blue MS17-10

The exploit same as Legacy✅

Change user name in send and exploit,py to \\ - But why⁉️

References