Premise

In this video walk-through, we demonstrated how to enumerate and exploit a vulnerable FTP server to gain remote access to the windows system. Then we did a privilege escalation through token impersonation.

Machine Name: Imposter

Difficulty: Beginner

Skills Learned

  • FTP exploitation
  • Windows Privilege Escalation
  • Token Impersonation with Metasploit

Get OSCP Certificate Notes

Video Walk-through

About the Author

I create cybersecurity notes, digital marketing notes and online courses. I also provide digital marketing consulting including but not limited to SEO, Google & Meta ads and CRM administration.

View Articles