top of page
z3r0day_504

Exploiting MS08-067 without Metasploit (HTB Legacy Walkthrough)



Enumeration

First we run a generic nmap scan against the box to see what ports and services are available:


We see that SMB is open, let's do some enumeration against that:



Running a vulnerability check using nmap, we see that the host is vulnerable to two CVEs. Let's focus on exploiting the latter (MS08-067).


Exploit

Use the following exploit from GitHub: https://github.com/jivoi/pentest/blob/master/exploit_win/ms08-067.py (this is already compatible with python3)


Generate shellcode to place inside the exploit and replace the existing shellcode in the exploit with this output (make sure to leave off the semicolon):


Start a netcat listener on the port you provided in the payload generation:


Run the exploit:


Your listener should have an established privileged connection to the box.


Resources


Information on MS08-067


158 views0 comments

Recent Posts

See All

Comments


bottom of page