Blue

Tasks
Recon
Get Access
Escalate
Cracking
Find Flags!
Recon
1) Scan the machine.
Created alias for IP using
alias blue.thm="10.10.84.x"
2) How many ports are open with a port number under 1000?
3
3) What is this machine vulnerable to? (Answer in the form of: ms??-???, ex: ms08-067)
Considering SMB 2.02 version is used, this machineis vulnerable to Eternal Blue exploit (MS17-010)
Gain Access
1) Start Metasploit
msfconsole
2) Find the exploitation code we will run against the machine. What is the full path of the code? (Ex: exploit/........)
3) Show options and set the one required value. What is the name of this value? (All caps for submission)
4) Confirm that the exploit has run correctly. You may have to press enter for the DOS shell to appear. Background this shell (CTRL + Z). If this failed, you may have to reboot the target VM. Try running it again before a reboot of the target.
Escalate
Skipped 1-5 since already got NT Authority. Although can use post/multi/manage/shell_to_meterpreter module.
Skipping 6-8 since its asking to run commands to prove NT privilege
Cracking
Use hashdump on metepreter sheel to get hashes: (Placed on file named hashes)
Administrator:500:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0::: Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0::: Jon:1000:aad3b435b51404eeaad3b435b51404ee:ffb43f0de35be4d9917ac0cc8ad57f8d:::
1) Within our elevated meterpreter shell, run the command 'hashdump'. This will dump all of the passwords on the machine as long as we have the correct privileges to do so. What is the name of the non-default user?
Jon
2) Copy this password hash to a file and research how to crack it. What is the cracked password?
Use John to Crack to crack NT hashes with rockyou.txt
sudo john --format=NT --rules -w=/usr/share/wordlists/rockyou.txt hashes
Jon's password is alqfna22
Find Flags!
1) Flag1?
2) Flag2?
3) Flag3?
Last updated
Was this helpful?