Premise
In this video walk-through, we demonstrated how to enumerate and exploit a vulnerable FTP server to gain remote access to the windows system. Then we did a privilege escalation through token impersonation.
Machine Name: Imposter
Difficulty: Beginner
Skills Learned
- FTP exploitation
- Windows Privilege Escalation
- Token Impersonation with Metasploit
Video Walk-through
Show Comments