Blue
Last updated
Was this helpful?
Last updated
Was this helpful?
Room Info
🔗 Name
🎯 Target IP
10.10.177.175
📈 Difficulty level
🟢Easy
💲 Subscription type
Free
🪟 OS
Windows
Used payload was windows/x64/shell/reverse_tcp
, so convert the shell to a meterpreter
shell.
My process may not run as SYSTEM
user. Select a PID
(process ID) with the NT AUTHORITY\SYSTEM
user, and migrate my process to that one. e.g.
1284 - spoolsv.exe
aad3b435b51404eeaad3b435b51404ee
is the LM hash for no password.
ffb43f0de35be4d9917ac0cc8ad57f8d
is the NTLM hash for alqfna22
.
Jon's credentials are jon
:alqfna22
.
🚩 In the meterpreter
session