In this video walkthrough, we went through the typical stages of a penetration test starting from the information gathering phase all the way to the exploitation and system compromise. I used a simple box called Blue from tryhackme.
We demonstrated the exploitation of Eternal blue vulnerability on Windows systems.
Machine Name: Eternal Blue TryHackMe
- Windows Exploitation
- Eternal blue vulnerability