My first Exploit

So In this I am going to show how I used metasploit to gain access to a machine we set up. Remember this is my first exploit so if you are looking for advanced techniques this is not the post for you.

One thing I have learned so far that I believe is an advantage to me is that you need to do a lot of research. And why I think that's an advantage is because the company I started originally was designed to do research to find programs to help veteran business owners succeed, based on their demographics. This gave me a lot of experience in google search for one and for another thing I chose to do that because I actually enjoy the hunt of google. Getting lost in searches I don't know why I enjoy it, maybe because it gives me a chance to hyperfocus on something, I don't know. But anyways I am going to show some pictures on how I did it. I understand some think I go overboard on pictures but remember this blog is partially a note taking thing for me. I am using this as a way for me to come back later if I don't remember how to do something. 












And this ^ is me gaining root access to a machine. 



Feel free to reach out on Linkedin or Twitter





















 

Comments

Popular posts from this blog

LLMNR

More mitigations

Overwrite and BadChars