Today I am trying the LEGACY machine of the HACKTHEBOX platform.
Machine IP :- 10.10.10.4
Now let start with the scanning
For scanning I use Nmap
Nmap Command :- nmap -sC -sV -A -Pn -oA nmap 10.10.10.4
Here 2 ports is open and 1 port is closed
From the scan, we found out a service Microsoft-ds
is running on port 445 and version of service is Windows XP Microsoft-ds
I Just simple search on google
I found the result https://www.rapid7.com/db/modules/exploit/windows/smb/ms08_067_netapi website page
There is an exploit in the Metasploit framework for this service.
The exploit name is clearly mentioned on the website.
So I started the Metasploit and search the exploit.
Yes There is an exploit in Metasploit named exploit/windows/smb/ms08_067_netapi
I use this exploit and try to get the reverse shell
And I get the reverse shell
And after some enumeration, I found the user.txt and root.txt file
This Walkthrough is written by Amit. Amit is a Penetration testing student at Azure Skynet. You can contact him from here.