Blue

Created by @darkstar7471

Tasks

  1. Recon

  2. Get Access

  3. Escalate

  4. Cracking

  5. Find Flags!

Recon

1) Scan the machine.

Created alias for IP using alias blue.thm="10.10.84.x"

2) How many ports are open with a port number under 1000?

3

3) What is this machine vulnerable to? (Answer in the form of: ms??-???, ex: ms08-067)

Considering SMB 2.02 version is used, this machineis vulnerable to Eternal Blue exploit (MS17-010)

Gain Access

1) Start Metasploit

msfconsole

2) Find the exploitation code we will run against the machine. What is the full path of the code? (Ex: exploit/........)

3) Show options and set the one required value. What is the name of this value? (All caps for submission)

4) Confirm that the exploit has run correctly. You may have to press enter for the DOS shell to appear. Background this shell (CTRL + Z). If this failed, you may have to reboot the target VM. Try running it again before a reboot of the target.

Escalate

Skipped 1-5 since already got NT Authority. Although can use post/multi/manage/shell_to_meterpreter module.

Skipping 6-8 since its asking to run commands to prove NT privilege

Cracking

Use hashdump on metepreter sheel to get hashes: (Placed on file named hashes)

Administrator:500:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0::: Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0::: Jon:1000:aad3b435b51404eeaad3b435b51404ee:ffb43f0de35be4d9917ac0cc8ad57f8d:::

1) Within our elevated meterpreter shell, run the command 'hashdump'. This will dump all of the passwords on the machine as long as we have the correct privileges to do so. What is the name of the non-default user?

Jon

2) Copy this password hash to a file and research how to crack it. What is the cracked password?

Use John to Crack to crack NT hashes with rockyou.txt

sudo john --format=NT --rules -w=/usr/share/wordlists/rockyou.txt hashes

Jon's password is alqfna22

Find Flags!

1) Flag1?

2) Flag2?

3) Flag3?

Last updated

Was this helpful?