Windows: SMB Server PSexec
Last updated
Last updated
In this lab environment, you will be provided with GUI access to a Kali machine. The target machine will be accessible at demo.ine.local.
Your task is to fingerprint the SMB service using the tools available on the Kali machine and then exploit the vulnerability using the Metasploit framework. You need to find valid credentials to access the SMB service and abuse the service with available SMB Metasploit exploitation modules.
Objective: Exploit the SMB service to get a meterpreter session on the target and retrieve the flag!
Metasploit Framework
Nmap