βοΈ2 - Quick Compromise

This section is a quick and fast way to get us a shell and user domain controller with a few simple (but very important) exploits enabled for outdated versions of windows, tomcat, mysql ...
There are some that are not exploitable in this v2 version of GOAD.
Zerologon
This exploit isnt functional for this version of GOAD (v2), but is relevant to have in consideration for anothers audits or CTFs, i dont know ...
Eternal Blue
[-] 192.168.56.10:445 - The target is not vulnerable.
[-] 192.168.56.11:445 - The target is not vulnerable.
[+] 192.168.56.12:445 - Host is likely VULNERABLE to MS17-010! - Windows Server 2016 Standard Evaluation 14393 x64 (64-bit)
[-] 192.168.56.22:445 - The target is not vulnerable.
[-] 192.168.56.23:445 - The target is not vulnerable.

Last updated