Ice

Recon

Lets run some nmap scan to find open ports and services

The hostname is Dark-PC as we can see in the nmap scan

Gain Access

The type of vulnerability can be found on CVE Details

We will be using Metasploit to gain access to the machine so lets start Metasploit.

Lets search for the vulnerability and set the right options

Now lets run the exploit

We have a shell on the machine

Escalate

To who we are on the machine and information related to the machine, we can use the sysinfo command

Lets run the module that will give us exploits that we can use to privilege escalate to a higher privilege user on the machine.

Now lets background this session using the command "background" and list the active sessions, then lets select the first exploit we just found and set the session number to the session we just backgrounded using the command "set sessions 1" .Now we have to set the right options and run the exploit. Once the command has been run, we can access the machine using the command "sessions 1".

Now we are in the machine as a higher privilege user, we can check this by using the command "getprivs"

Looting

Lets now follow the steps in the room

Post-Exploitation

With the help command we can answer the questions in the this task

Last updated