Premise

In this video walk-through, we demonstrated how to enumerate and exploit a vulnerable FTP server to gain remote access to the windows system. Then we did a privilege escalation through token impersonation.

Machine Name: Imposter

Difficulty: Beginner

Skills Learned

  • FTP exploitation
  • Windows Privilege Escalation
  • Token Impersonation with Metasploit

Get OSCP Certificate Notes

Video Walk-through

About the Author

Cybersecurity Trainer MS in Cybersecurity Expertise in Healthcare and Finance Industries Penetration tester and compliance auditor

View Articles