Windows privileged escalation / aspx reverse shell

Поділитися
Вставка
  • Опубліковано 16 вер 2024
  • #devel #htb #hackthebox #windows #devel
    OSCP Lab | Windows Machine Root Privilege Escalation | aspx reverse shell
    Start the recon process by running Nmap against our target (on 10.10.10.5) which reveals an FTP server open for anonymous connections on TCP port 21.
    compiled exploit is here--
    github.com/aba...
    blogg
    leetvilu.blogs...
    / realvilu
    / realvilu
    / thevishalboss

КОМЕНТАРІ • 3

  • @hackchod6386
    @hackchod6386 5 років тому +2

    Devel Htb retired machines

  • @XDAHACKS
    @XDAHACKS 5 років тому +1

    thanks

    • @hacksudo
      @hacksudo  5 років тому

      It's my pleasure brother 😊