TryHackMe - Steel Mountain Walkthrough - Manual Windows Exploitation

preview_player
Показать описание
In this video, we explore the process of gaining an initial foothold on a Windows target and how to elevate your privileges by exploiting Unquoted Service Paths both manually and automatically with Metasploit.

-----------------------------------------------------------------------------------

-----------------------------------------------------------------------------------

-----------------------------------------------------------------------------------

-----------------------------------------------------------------------------------

We hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.

-----------------------------------------------------------------------------------
Thanks for watching!
Благодарю за просмотр!
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d'avoir regardé
Obrigado por assistir
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
-----------------------------------------------------------------------------------
#TryHackMe#Pentesting
Рекомендации по теме
Комментарии
Автор

Just wanna say what you're doing is pure gold for the community

obkanobi
Автор

Your intro is iconic. It's like the start-up music to a favorite show or something. Once I hear "Hey, guys! Hackersploit here, back again, WITH another video...", I know it's gonna be a great video. It's great stuff. Thank you for what you do.

jamess
Автор

Watching these videos is going to help me to pass my cybersecurity courses! Please don't take this video down!!! Thank you Much!

susananthony
Автор

I really appreciate your videos. You do a great job with clear audio and clear video of the computer. Your added insights and perspectives on the processes that are taking place really flesh out the tryhackme rooms. Thank you and don't stop.

edwardcharron
Автор

Thank you for your dedication, I remember when I first found your videos (recently) and I thought you would look older based on your voice but to my surprise you’re a lot younger than I imagined (kinda off topic lol). Regardless thank you, you’ve made it easier for an old 37yr like myself to dive deeper into cybersecurity!

ColdSteel-dzpf
Автор

Remote Desktop Protocol (RDP) is a Microsoft proprietary protocol that enables remote connections to other computers, typically over TCP port 3389.

pharrellarts
Автор

Can't wait to check your other videos out!

missx
Автор

Great walkthrough and content! Thank you very much. Subscribed

datag
Автор

Thank you so much for this! Crisp and clear explanations!

missx
Автор

You hack through that like a fucking boss. I wish to be at your skill level someday. You are awesome!! I learn so much from your videos!!

haroldgar
Автор

amazing explanation. I got by without any trouble. Thank you

jaywandery
Автор

I just want to give a quick update:
39161.py needs to be run using python2 to bypass the following error message:
SyntaxError: (unicode error) 'unicodeescape' codec can't decode bytes in position 2-3: truncated escape

gkhnsgl
Автор

Thank you very much ! for all your videos.

daniellozano
Автор

Thank you so much, you seriously ROCK!

felipecg
Автор

Thank you are a legend in the security community.

OMER--
Автор

thanks man, it would have taken me ages just to find certutil

shahrukhtramboo
Автор

in the last task it said not to use metasploit but you used metasploit to migrate the shell is there any other way to migrate without metasploit?

itsmdud
Автор

Can't wait for active directory 😘

mabusugaming
Автор

I don’t get the meterpreter session when I start the advancedsystemcareservice9

fmoney
Автор

Can you tell me what's the difference between making a meterpreter session multi/handler and netcat to get a listener?

acidjumps