In this video walk-through, we demonstrated how to enumerate and exploit a vulnerable FTP server to gain remote access to the windows system. Then we did a privilege escalation through token impersonation.
Machine Name: Imposter
- FTP exploitation
- Windows Privilege Escalation
- Token Impersonation with Metasploit