The document lists operating systems and exploits that can be used against them. It also provides comments on using exploits to bypass antivirus and transfer files to compromised machines. It includes a list of Hack the Box VMs categorized by difficulty.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
257 views7 pages
Operation System Non-Metasploit
The document lists operating systems and exploits that can be used against them. It also provides comments on using exploits to bypass antivirus and transfer files to compromised machines. It includes a list of Hack the Box VMs categorized by difficulty.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 7
Operation System Non-Metasploit
Windows Server 2012 x64 MS16-032.ps1
Microsoft Windows 7 Enterprise 6.1.7600 - x86 Microsoft Windows Server 2008 R2 Datacenter x64 MS15-051.exe Microsoft Windows Server 2008 R2 Standard x64 ms15-051x64.exe Microsoft(R) Windows(R) Server 2003, Standard Edition x86 Microsoft Windows Server 2008 R2 Datacenter x64 - 1 proccessor ms15-051x64.exe Metasploit ms16-032_secondary_logon_handle_privesc ms10-015_kitrap0d