Walkthrough 2222
Walkthrough 2222
URL https://attackdefense.com/challengedetails?cid=2222
Important Note: This document illustrates all the important steps required to complete this lab.
This is by no means a comprehensive step-by-step solution for this exercise. This is only
provided as a reference to various commands needed to complete this exercise and for your
further research on this topic. Also, note that the IP addresses and domain names might be
different in your lab.
Step 2: Ping the target machine to see if it’s alive or not.
Step 4: We have discovered that multiple ports are open. SMB port 445 is also exposed. We
will run the Nmap script to list the supported protocols and dialects of an SMB server.
Step 6: We have the SMB server credentials i.e administrator:smbserver_771. We will use it
with Nmap script to scan the target to discover sensitive information.
Enumerating the users logged into a system through an SMB share with Nmap script.
We can observe that on the target machine we have discovered that user bob is logged into
without any credentials.
This is possible because the target machine is running with the guest login enable configuration
and it is a misconfiguration.
In case guest login is not enabled we can always use valid credentials of the target machine to
discover the same information.
Command: nmap -p445 --script smb-enum-sessions --script-args
smbusername=administrator,smbpassword=smbserver_771 10.0.17.200
Also, we can notice that IPC$ share has read and write permissions.
“The IPC$ share is also known as a null session connection. By using this session, Windows
lets anonymous users perform certain activities, such as enumerating the names of domain
accounts and network shares.”
Step 9: Get information about the server statistics. It uses port 445 and port 139 to fetch the
details.
Please note: There is a possibility that the above output would be different in your case which
is completely okay.
We have received the information about the built-in domain on the target machine.
1. Nmap (https://nmap.org/)
2. Nmap Scripts (https://nmap.org/nsedoc/scripts)