Member-only story

Blue WriteUp | HackTheBox | Automated Exploitation

Onurcan Genç
7 min readMar 6, 2024

--

Hi everyone ! As I mentioned before, I will also explain and give perspective on automated exploitation which is really enjoying.

Now let’s get start with reconnaissance by using nmap.

1) Reconnaissance

Firstly, I must say that in my initial attempt, perhaps the reasons behind the high demand in network traffic in the CTIS department are unclear. I genuinely did not grasp why my port scans were inadequate in detecting vulnerable parts of the OS. However, I am pleased to report that there were no issues found in my dormitory network. Therefore, enjoy with my write-up :)

  • I used same network scan command in my attempt.
sudo nmap -sV -script vuln 10.10.10.40
I can sincerely say that there is no conflict in this scan.
Here you can see our ms17_010 vulnerability by using — script vuln parameter.

In order to invoke Metasploit Framework just use:

msfconsole

You most probably encounter with different welcome messages generated by Metasploit Framework. I should say that this is…

--

--

Onurcan Genç
Onurcan Genç

Written by Onurcan Genç

Offensive Security Specialist | Tech Enthusiast Welcome to my playground !

No responses yet