THM Metasploit: Meterpreter - grunt92/IT-Sec-WriteUps GitHub Wiki

Introduction to Meterpreter

No answer needed

No answer needed

Meterpreter Flavors

No answer needed

No answer needed

Meterpreter Commands

No answer needed

No answer needed

Post-Exploitation with Meterpreter

No answer needed.

No answer needed

Post-Exploitation Challenge

What is the computer name?

Follow the instructions provided by THM. Use the "exploit/windows/smb/psexec". Set the RHOSTS to the target IP, set the SMBUser to "ballen" and the SMBPass to "Password1". Run the exploit. After the meterpreter-session is established you can use sysinfo to get the answer.

ACME-TEST

What is the target domain?

FLASH

What is the name of the share likely created by the user?

Background the meterpreter-session, search "enumshares" and use "scanner/smb/smb_enumshares". Set the RHOSTS, SMBPass and SMBUser and run the scanner. If successful the scanner will list all shares. By looking at the shares you will see a share that stands out.

speedster

What is the NTLM hash of the jchambers user?

Search for NTLM. One of the modules is called "windows_secrets_dump". Use the module set the RHOSTS, SMBPass and SMBUser and run the module. One of the dumped secrets is a list of NTLM hashes. Exactly what we are looking for.

69596c7aa1e8daee17f8e78870e25a5c

What is the cleartext password of the jchambers user?

Copy the hash and select a tool of your choice to crack the password to get the answer.

Trustno1

Where is the "secrets.txt" file located?

Re-enter your meterpreter session. Run search -f secrets.txt to get the answer.

*c:\Program Files (x86)\Windows Multimedia Platform*

What is the Twitter password revealed in the "secrets.txt" file?

Run cat "c:\Program Files (x86)\Windows Multimedia Platform\secrets.txt"

KDSvbsw3849!

Where is the "realsecret.txt" file located?

Run search -f realsecret.txt to get the answer.

*c:\inetpub\wwwroot*

What is the real secret?

Run cat "c:\inetpub\wwwroot\realsecret.txt".

The Flash is the fastest man alive