4 minutes
THM_Blue_Walkthrough
Eternal Blue TryHackMe
performed by: jb-williams
Note- some output will be shortened denoted by “….”
Scanning/Recon
After finding the IP address, I ran my basic nmap recon:
Results -
- Came back with these results and noticed ports
138
and445
, which are usually SMB so I ran nmap with specific SMB scripts:
the first one could work but I don’t think my VM could handle it so I did a little research and ran the second cmd
- The results of the SMB scan were:
- Found that the vulnerability in SMB was
HIGH
, and went to Metasploit to find an expoit to attempt.
Gain Access
-
I noticed the scanner module and decided to verify the vulnerability with it, which it confirmed the vulnerability.
-
Then I tried index 2 exploit.
May have to press ENTER to make the CMD prompt open.
- Then press
CTRL+z
to push this shell session to the background.
Escalate
-
Then you can try to escalate the standard shell session to an escalated meterpreter session.
-
Select the
shell_to_meterpreter
module.
-
List the modules options with
otpions
-
List the available sessions with
sessions -l
. -
Set the option to the correct session and run.
-
After it completes
sessions -l
thensessions -i <ID#>
to connect to that session. -
Verified escalation by checking my user.
- Looking up processes on the machine and found that this one seemed interesting.
- Then I migrated to winlogon.exe and was able to dump the password hashes on the system.
Cracking
-
Then I took Jon’s password hash
ffb43f0de35be4d9917ac0cc8ad57f8d
. -
Used Crackstation.net to crack the hash.
User | Password |
---|---|
jon | alqfna22 |
- Was able to login as Jon then started looking for flags.
Searching for flags
- Found flag1 by going to root C: drive and ls and catting flag1.txt
- Found flag2 looking for Windows Sam Config
- Found flag3 in Jon’s Documents folder.
written and performed by jb-williams - github
windows pentest escalation metasploit scanning password-cracking smb tryhackme blue eternal-blue walkthrough
752 Words
2022-09-28 10:21