Blue


Intro

Room Info

πŸ”— Name

🎯 Target IP

10.10.177.175

πŸ“ˆ Difficulty level

🟒Easy

πŸ’² Subscription type

Free

πŸͺŸ OS

Windows


Recon


Exploitation


Privilege Escalation

  • Used payload was windows/x64/shell/reverse_tcp, so convert the shell to a meterpreter shell.

  • My process may not run as SYSTEM user. Select a PID (process ID) with the NT AUTHORITY\SYSTEM user, and migrate my process to that one. e.g. 1284 - spoolsv.exe


Post Exploitation

Cracking

aad3b435b51404eeaad3b435b51404ee is the LM hash for no password.

ffb43f0de35be4d9917ac0cc8ad57f8d is the NTLM hash for alqfna22.

Jon's credentials are jon:alqfna22.

Flags

  • 🚩 In the meterpreter session


Last updated

Was this helpful?