Thank you for not using metasploit. I think you are the only person who does that with such great content. Always my go to channel for OSCP.
@ITSecurityLabs5 жыл бұрын
Here is a link to impacket, thats where i got the smbserver python script : github.com/SecureAuthCorp/impacket
@ithinkv5 жыл бұрын
It's interesting, I did this before your video, but one thing different I did was upload nc.exe via the ftp and run it with the shell, however when it came to running the exploit, the system was out of memory? Ran it from the smb share and it worked fine (nc.exe and exploit).
@dadebarlow18835 жыл бұрын
When I do this the command code displays but does not execute. Any ideas?
@avi15654 жыл бұрын
i feel it can be a 4-5 min of vid. if u put reverse shell directly throught ftp ...........
@adithyaturaga29724 жыл бұрын
Literally dint understand anything that came after the music .. how did you manage to find the system info without getting the shell ? please explain cheers ! :D
@RTWarpath4 жыл бұрын
So you host the server on your attacker machine, start a netcat on your attacker machine, run the code on the aspx file, your netcat will catch and you should have a shell. Then you proceed to priv-es