The document lists operating systems and exploits that can be used against them. It also provides comments on using exploits to bypass antivirus and transfer files to compromised machines. It includes a list of Hack the Box VMs categorized by difficulty.
The document lists operating systems and exploits that can be used against them. It also provides comments on using exploits to bypass antivirus and transfer files to compromised machines. It includes a list of Hack the Box VMs categorized by difficulty.
The document lists operating systems and exploits that can be used against them. It also provides comments on using exploits to bypass antivirus and transfer files to compromised machines. It includes a list of Hack the Box VMs categorized by difficulty.
The document lists operating systems and exploits that can be used against them. It also provides comments on using exploits to bypass antivirus and transfer files to compromised machines. It includes a list of Hack the Box VMs categorized by difficulty.
Download as XLSX, PDF, TXT or read online from Scribd
Download as xlsx, pdf, or txt
You are on page 1of 7
Operation System Non-Metasploit
Windows Server 2012 x64 MS16-032.ps1
Microsoft Windows 7 Enterprise 6.1.7600 - x86 Microsoft Windows Server 2008 R2 Datacenter x64 MS15-051.exe Microsoft Windows Server 2008 R2 Standard x64 ms15-051x64.exe Microsoft(R) Windows(R) Server 2003, Standard Edition x86 Microsoft Windows Server 2008 R2 Datacenter x64 - 1 proccessor ms15-051x64.exe Metasploit ms16-032_secondary_logon_handle_privesc ms10-015_kitrap0d