WE VERIFY THE CONNECTION BY PINGING THE BOX IP
WE SEE THAT 139 AND 445 ARE OPEN SO WE ATTACK SMB SHARES WITH SMBCLIENT
WE ARE ABLE TO DISCOVER A LIST SO LETS KEEP ENUMERATING THROUGH EACH ONE TO SEE IF WE CAN GET MORE INFO
SO WE GOOGLED THE VERSION AND FOUND EXPLOITS WE CAN TRY
COPY THIS MODULE AND INSERT INTO METASPLOIT
SO THIS PAYLOAD WAS NOT WORKING, I DISCOVERED WHY WHEN I LOOKED AT THE TARGETS AND THEN LOOKED BACK AT THE NMPA SCAN AND IT DIDNT MATCH
THE 135,139 PORTS DID NOT WORK BUT THE 445 PORT DID GENERATE A SHELL
WE ARE ABLE TO POP A SHELL WITH METERPRETER ON PORT 445 WITH THE ETERNALBLUE EXPLOIT
USE THE SHELL COMMAND TO NAVIGATE THROUGHOUT THE METERPRETER SHELL