Hackthebox Walkthrough: Legacy

Share on facebook
Facebook
Share on twitter
Twitter
Share on linkedin
LinkedIn
Share on whatsapp
WhatsApp

Today I am trying the LEGACY machine of the HACKTHEBOX platform.

Machine IP :- 10.10.10.4

Now let start with the scanning

For scanning I use Nmap

Nmap Command :- nmap -sC -sV -A -Pn -oA nmap 10.10.10.4

Here 2 ports is open and 1 port is closed

From the scan, we found out a service Microsoft-ds

is running on port 445 and version of service is Windows XP Microsoft-ds

I Just simple search on google

I found the result https://www.rapid7.com/db/modules/exploit/windows/smb/ms08_067_netapi    website page

There is an exploit in the Metasploit framework for this service.

The exploit name is clearly mentioned on the website.

So I started the Metasploit and search the exploit.

Yes There is an exploit in Metasploit named exploit/windows/smb/ms08_067_netapi

I use this exploit and try to get the reverse shell

And I get the reverse shell

And after some enumeration, I found the user.txt and root.txt file

Thank you.

This Walkthrough is written by Amit. Amit is a Penetration testing student at Azure Skynet. You can contact him from here.

Share on facebook
Facebook
Share on twitter
Twitter
Share on linkedin
LinkedIn
Share on whatsapp
WhatsApp

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top