GCEH 1 : http://akademy.edu.vn/course/gceh1/
Hướng dẫn đăng kí tham gia học https://akademy.edu.vn/ban-can-biet/huong-dan-dang-ki-hoc-bao-mat-thong-tin/
Description:
A realistic (at the time of writing) Windows box that is relatively simple in complexity.
Related Hosting Links
- TryHackMe.com
- Hosted currently as a free room! Recommended for beginners.
- Link: https://tryhackme.com/room/blue
Special Notes:
If using VMware, use NAT. This can be very picky about being on host-only for whatever reason and often times just doesn't work. You'll notice the IP of both the attack box and the target vulnerable box change in this case
Instructions:
- Start by first checking the IP address of the Kali (or other attack box) you are attacking from
- Following finding the IP address of our attack box, we can move onto discovering the address of the vulnerable box we will be attacking. This can be done either via netdiscover or nmap. Nmap is demonstrated below with a few select flags added for vulnerability discovery.
- After waiting a bit, we can see the our results have been generated:
- Let's start Metasploit
- And find ms17-010 related exploits
- Our search results
- Let's go ahead and use this one
- Before we continue, we should check what options we must set before running this exploit
- Looks like we'll have to set the RHOST, remote host
- That should be everything, let's go ahead and run it!
- For now, let's go ahead and background this dos shell. We're going to upgrade it to a meterpreter shell, something quite a bit more powerful for our purposes!
- Let's go ahead and set our current module to the converter and check the options we'll have to set
- Looks like we'll have to set which session we need to convert, let's list our sessions
- Looks like we'll have to set it to session 1
- Looks good! Let's go ahead and launch our converter
- Let's go ahead and make sure we have system level privileges
- We'll go ahead and background this shell since we've confirmed that we have elevated permissions. Let's get ready to dump any password hashes on the system.
- First, let's list all of the processes running on the system. Just because we have system level privileges doesn't mean our process does! We'll have to migrate to a new process that does have those permissions
- Look for a process running as nt authority\system from this list generated
- Good candidates here are powershell and cmd or programs such as word that may have been left running on this system
- Once a process is found, type migrate PROCESSID, where PROCESSID is the id of the process we are migrating to (left column of the ps table generated previously)
- Once you control a higher-privileged process, type hashdump
- Look for the three flags spread throughout the system!
Flags:
Three spread throughout the system in the following locations:
- The root of the C drive, meant to represent initial contact with the system and a good sanity check for pen testers.
- C:\Windows\System32\config, this is the actual location of the SAM database
- Admin's (Jon's) documents folder, elevated user's and staff documents can be very useful in prolonged engagements.
0 comments:
Post a Comment