top of page

Exploiting MS08-067 without Metasploit (HTB Legacy Walkthrough)


ree

Enumeration

First we run a generic nmap scan against the box to see what ports and services are available:

ree

We see that SMB is open, let's do some enumeration against that:

ree

ree

Running a vulnerability check using nmap, we see that the host is vulnerable to two CVEs. Let's focus on exploiting the latter (MS08-067).


Exploit

Use the following exploit from GitHub: https://github.com/jivoi/pentest/blob/master/exploit_win/ms08-067.py (this is already compatible with python3)


Generate shellcode to place inside the exploit and replace the existing shellcode in the exploit with this output (make sure to leave off the semicolon):

ree

Start a netcat listener on the port you provided in the payload generation:

ree

Run the exploit:

ree

Your listener should have an established privileged connection to the box.


Resources


Information on MS08-067


Comments


©2025 by Corgi Corp. Proudly created with Wix.com

bottom of page