NYP InfoSec Introduction to Pentesting Workshop
NYP InfoSec Introduction to Pentesting Workshop
Exporting the IP as shell variable to make life easier
export ip=10.10.24.176Task 1 [Recon]
Nmap Scan
nmap -A -T4 -oN output.nmap $ipRedacted nmap output
# Nmap 7.92 scan initiated Thu Mar 10 19:57:12 2022 as: nmap -A -T4 -vv -oN nmap.out 10.10.24.176
Increasing send delay for 10.10.24.176 from 0 to 5 due to 26 out of 64 dropped probes since last increase.
Nmap scan report for 10.10.24.176
Host is up, received conn-refused (0.32s latency).
Scanned at 2022-03-10 19:57:13 +08 for 168s
Not shown: 991 closed tcp ports (conn-refused)
PORT STATE SERVICE REASON VERSION
135/tcp open msrpc syn-ack Microsoft Windows RPC
139/tcp open netbios-ssn syn-ack Microsoft Windows netbios-ssn
445/tcp open microsoft-ds syn-ack Windows 7 Professional 7601 Service Pack 1 microsoft-ds (workgroup: WORKGROUP)
3389/tcp open ssl/ms-wbt-server? syn-ack
Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at <https://nmap.org/submit/> .
# Nmap done at Thu Mar 10 20:00:01 2022 -- 1 IP address (1 host up) scanned in 168.71 seconds
Enumeration

Task 2 [Gain Access]
Gaining Shell

Module options to set

Confirm that the exploit works

Task 3 [Escalate]
Upgrading command shell to Meterpreter

Swap to Meterpreter shell after running the post module

Confirm that the Meterpreter shell works and that we are
Migrating Process

Dumping Users Hash
Task 4 [Cracking]
Identifying the type of hash

Cracking the hash

Why did we fail to crack Administrator and Guest Hash?
Task 5 [Find Flags!]
Challenge
Attempt to exploit the machine without using Metasploit!
Installing Requirements
Checking if machine is vulnerable to EternalBlue
Compiling Shellcode
Preparing the listener (following the instructions)
OR Using a netcat listener instead
PWN the target!
Closing Thoughts
References
Last updated