HackTheBox Legacy - with Metasploit

Ari Kalfus | Feb 9, 2020 min read

This series will follow my exercises in HackTheBox. All published writeups are for retired HTB machines. Whether or not I use Metasploit to pwn the server will be indicated in the title.


Difficulty: Easy

Machine IP:

As always, I start enumeration with AutoRecon. I see that the server is running SMB and the OS is likely Windows XP.

Autorecon results nmap results nmap script results

Let’s see what options I have in Metasploit. I’ll use the MS08_67 exploit.

msf search

I configure the exploit options to target

msf exploit

And there I have it. A root shell.

root shell

From here I can read the user and root’s flags with ease (ignoring some Windows directory traversal mistakes).

user flag root flag
comments powered by Disqus