{"id":2172,"date":"2026-03-12T12:00:00","date_gmt":"2026-03-12T12:00:00","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/locky\/?p=2172"},"modified":"2026-03-10T23:28:32","modified_gmt":"2026-03-10T23:28:32","slug":"penetration-testing-in-windows-exploiting-smb-vulnerabilities","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/locky\/2026\/03\/12\/penetration-testing-in-windows-exploiting-smb-vulnerabilities\/","title":{"rendered":"Penetration Testing in Windows: Exploiting SMB Vulnerabilities"},"content":{"rendered":"\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/03\/Lab-Assignment-4-Penetration-Testing-for-Windows-System-fd_4.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"both\" data-toolbar-fixed=\"on\">Lab-Assignment-4-Penetration-Testing-for-Windows-System-fd_4<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<ul class=\"wp-block-social-links has-normal-icon-size has-visible-labels has-icon-color has-icon-background-color is-style-default is-horizontal is-content-justification-center is-layout-flex wp-container-core-social-links-layout-1 wp-block-social-links-is-layout-flex\"><li style=\"color: #ffffff; background-color: #cf2e2e; \" class=\"wp-social-link wp-social-link-chain has-white-color wp-block-social-link\"><a rel=\"https:\/\/www.credly.com\/users\/carl-lochstampfor-jr noopener nofollow\" target=\"_blank\" href=\"http:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/03\/Lab-Assignment-4-Penetration-Testing-for-Windows-System-fd_4.pdf\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.6,7.2H14v1.5h1.6c2,0,3.7,1.7,3.7,3.7s-1.7,3.7-3.7,3.7H14v1.5h1.6c2.8,0,5.2-2.3,5.2-5.2,0-2.9-2.3-5.2-5.2-5.2zM4.7,12.4c0-2,1.7-3.7,3.7-3.7H10V7.2H8.4c-2.9,0-5.2,2.3-5.2,5.2,0,2.9,2.3,5.2,5.2,5.2H10v-1.5H8.4c-2,0-3.7-1.7-3.7-3.7zm4.6.9h5.3v-1.5H9.3v1.5z\"><\/path><\/svg><span class=\"wp-block-social-link-label\">Full Screen or Download<\/span><\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n","protected":false},"excerpt":{"rendered":"<p>This lab demonstrates penetration testing techniques against Windows systems using Kali Linux and the Metasploit framework. The exercise includes scanning with Nmap, exploiting the MS08-067 SMB vulnerability on Windows XP, testing EternalBlue against Windows Server 2022, and generating a Meterpreter payload for Windows 7. The assignment highlights how legacy vulnerabilities, misconfigurations, and outdated systems can expose networks to remote exploitation.<\/p>\n","protected":false},"author":30379,"featured_media":2174,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"image","meta":{"advanced_seo_description":"This lab demonstrates penetration testing techniques against Windows systems using Kali Linux and the Metasploit framework. The exercise includes scanning with Nmap, exploiting the MS08-067 SMB vulnerability on Windows XP, testing EternalBlue against Windows Server 2022, and generating a Meterpreter payload for Windows 7. The assignment highlights how legacy vulnerabilities, misconfigurations, and outdated systems can expose networks to remote exploitation.","jetpack_seo_html_title":"Penetration Testing in Windows: Exploiting SMB Vulnerabilities","jetpack_seo_noindex":false,"footnotes":"","wds_primary_category":235,"jetpack_publicize_message":"Hands-on penetration testing lab using Kali Linux & Metasploit \ud83d\udd10\nExploited SMB vulnerabilities, tested EternalBlue defenses, and deployed Meterpreter payloads across Windows XP, Windows 7, and Server 2022 environments.\n#Cybersecurity #PenTesting #Metaspl","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[239,172,214,237,235,211,236,238],"tags":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/03\/Metasploit_Lab.jpg?fit=784%2C1168&ssl=1","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/posts\/2172"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/users\/30379"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/comments?post=2172"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/posts\/2172\/revisions"}],"predecessor-version":[{"id":2175,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/posts\/2172\/revisions\/2175"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/media\/2174"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/media?parent=2172"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/categories?post=2172"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/tags?post=2172"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}