Blue
Intro
Room Info

π Name
π― Target IP
10.10.177.175
π Difficulty level
π’Easy
π² Subscription type
Free
πͺ OS
Windows
Recon
Exploitation

Privilege Escalation
Used payload was
windows/x64/shell/reverse_tcp, so convert the shell to ameterpretershell.

My process may not run as
SYSTEMuser. Select aPID(process ID) with theNT AUTHORITY\SYSTEMuser, and migrate my process to that one.e.g.1284 - spoolsv.exe

Post Exploitation
Cracking
aad3b435b51404eeaad3b435b51404ee is the LM hash for no password.
ffb43f0de35be4d9917ac0cc8ad57f8d is the NTLM hash for alqfna22.
Jon's credentials are jon:alqfna22.

Flags
π© In the
meterpretersession



Last updated
Was this helpful?