Post

MS17-010

Table of content

  1. Intoduction
  2. Hacking Phases in Bizness HTB

  3. Let’s Begin

    • Information Gathering
    • Directory Enumeration
    • Vulnerability Analysis
    • Exploitation
    • Privilege Escalation
  4. Conclusion

Introduction

Information Gathering

How about we begin by nmap a scans to check which ports are currently being used?

1
nmap -sV --script=vuln -T4 10.10.20.214 -oN nmap.scans2 -vv 

Alt text

…..

Directory Enumeration

………

Vulnerability Analysis

……………..

Exploitation

reference

TOBE continues …..

CVE-2023-51467 and CVE-2023-49070

This post is licensed under CC BY 4.0 by the author.