October 2018
Intermediate to advanced
404 pages
8h 50m
English
Now you have a route, it is time to reconnoiter. To keep down the noise, we will use a simple port scanner within Metasploit:
background
This keeps the session running open and in the background.
use auxiliary/scanner/portscan/tcp set RHOSTS 192.168.202.0/24 set PORTS 139,445,389
We have set the port 389 to find the domain controller.
set THREADS 20
run
The scanner runs and we see a Windows domain controller. This is our new target:
We now have our target and a password hash so the next step is to upload an exploit. Since we ...