Bypassing EPP — Chapter 3

Using Shellter

Figure 1: Shellter
Figure 2: Exploits quarantined
Figure 3: Reverse TCP Metasploit exploit
Figure 4: Starting reverce TCP handler
Figure 5: Metasploit — active channels
Figure 6: Exploit running with admin privileges
Figure 7: Resource monitor

Maintaining access

Figure 8: User ‘Test’ added

Lateral Movement using PsExec

Figure 9: Remote access to the victim machine

--

--

--

P.O.TECH is a group of 6 entities: Potech Consulting, Potech Academy, Potech Labs, Obsoft, Potech SOC and NIGMA Conseil.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

{UPDATE} Billar Frances Carambola Hack Free Resources Generator

What is an A record when it comes to DNS records?

How to stake your $XPRT (Persistence) with Cosmostation and Earn Rewards (low commission) ?

REAP Wallet (ver. App) User Guide

SCAMINA. 5th Airdrop was started!

{UPDATE} Guess Animals Quiz Game Hack Free Resources Generator

JSON Web Token — Explanation

Online Privacy Essentials Continued

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
P.O.TECH

P.O.TECH

P.O.TECH is a group of 6 entities: Potech Consulting, Potech Academy, Potech Labs, Obsoft, Potech SOC and NIGMA Conseil.

More from Medium

Property-based testing #1: What is it anyway?

Software Learning Approach : Reference to Finite Element Analysis Software Packages

Object Oriented Programming with java an Overview

Unit Testing