Blue
Deploy & hack into a Windows machine, leveraging common misconfigurations issues.
Scanning
Commands:
-sV – checks the version of the running services
–script vuln – runs some scripts so we can answer question
Exploit
Now i won’t paste the whole output we are only interested in ms17-010. Now let’s open metasploit and confirm if the host if vulnerable or not:
Now we use the command search to find the module that we want:
And we found it now let’s use it:
Now we need to specify the rhost:
Output:
Sweet now we can use the exploit for Eternal Blue:
Let’s see the options that we need to specify:
Let’s specify the rhost and we are good to go:
And we are in:
Now we can migrate our process to another that is running from the user “authority\system”:
First type “getsystem” in the meterpreter in order to get more access so we can migrate the process. Then type:
Now we can dumb the hash and crack it:
Now we can use john to crack the hashes:
The flags are located in the following directories:
C:\ – flag1
C:\Windows\System32\config – flag2
C:\Users\Jon\Documents – flag3
Last updated