🔬Credentials Dumping
Lab 1 - Unattended Files
Target IP:
10.4.19.9Searching for password in Windows Configuration files
Both Kali Machine and Attacker/Victim Windows machine are provided
On the Attacker machine check the current user

Exploitation
From the Kali machine, generate a
meterpreterx64 payload
Set up a web server to host the payload
Download the payload file on the target system using the
certutiltool incmd
Stop the http server and start
msfconsoleon the Kali machine
Execute the
payload.exeon the Win target system and check the reverse shell on Kali

Manually search for the
unattend.xmlfile, it should be insideC:\\Windows\\Panther

In a new terminal tab

Get Access
administratoruser configured base64 password isQWRtaW5AMTIzSave it to a new file
Decode it using the
base64tool

Test the
administrator:Admin@123rootcredentials with thepsexectool

Lab 2 - Mimikatz
🔬 Windows: Meterpreter: Kiwi Extension
Target IP:
10.2.29.32Dumping passwords hashes with mimikatz
Both Kali Machine and Attacker/Victim Windows machine are provided
Enumeration & Exploitation
📌 Exploit BadBlue 2.7 with
metasploit
Privilege Escalation

Hash Dumping - Kiwi
In the
meterpretersession load Kiwi


Retrieve all credentials
Dump LSA SAM (NTLM hashes for all users)

Dump LSA secrets. This could provide with clear-text passwords
Hash Dumping - Mimikatz.exe
Run
mimikatz.exe
Dump the cache of the
lsassprocess


Display logon passwords, when stored in clear-text
in this case clear-text password are disabled -
(null)

Lab 3 - Pass-the-hash
🔬 Windows: Meterpreter: Kiwi Extension - same lab as Lab 2
Target IP changed:
10.2.29.32Use Pass-the-hash attack
Both Kali Machine and Attacker/Victim Windows machine are provided
Enumeration & Exploitation
📌 Exploit BadBlue 2.7 with
metasploit
Privilege Escalation
Hash Dumping - Kiwi
📌 Save users NTLM hashes in a text file for future use
Administrator: e3c61a68f1b89ee6c8ba9507378dc88d
student: bd4ca1fbe028f3c5066467a7f6a73b0b
Pass-the-hash PSExec
LM+NTLM hash is necessary, so copy the string:
aad3b435b51404eeaad3b435b51404ee:e3c61a68f1b89ee6c8ba9507378dc88d
Use PSExec to login with
Administratoruser and its password hashes

Crackmapexec

Last updated
Was this helpful?
