

This concludes all the required tasks in this machine. Let’s use the auxiliary scanner to see what we get.įlag2.txt C:\Windows\System32\config\flag2.txt Flag 2: So, to check this we can run auxiliary module with following command:Īuxiliary/…/…/: Auxiliary modules include port scanners, fuzzers, sniffers, and more. Because we do not want to harm the host with a careless exploit. If you have a general idea of what you are looking for, you can search for it via search.īefore going any further, it is always advisable to check first if the host is vulnerable, before firing up an exploit in penetration testing. Search: The msfconsole includes an extensive regular expression-based search functionality. To search for the exploit, type of console: search eternalblue Let’s fire up Metasploit using command msfconsole. So, to exploit the machine and gain a foothold, we will use Metasploit. Task 2: Gain Access After a quick google search about ms17-010 exploit, I got to know that there is a Metasploit module ms17-010 Eternal blue. The output of the scan shows that the machine is vulnerable to ms17-010, which is known as Eternal Blue!

Vuln: These scripts check for specific known vulnerabilities and generally report results only if they are found.
Tryhackme burp suite repeater walkthrough full#
–script (Nmap Scripting Engine ‘NSE’): Specify the -script option to choose your scripts to execute by providing categories, script file names, or the name of directories full of scripts you wish to execute. To Enumerate port 445, we will use Nmap script and following command: Here, the Microsoft– DS service is running on port number 445 and it is used by SMB (Server Message Block) service and that the system is running on Windows 7. So, we need to scan the machine to see if it is vulnerable to Eternal Blue (assuming it is called a blue machine) or other vulnerabilities affecting the older operating systems. We can do this using Nmap as well. Now, we can see the open ports and which services are running on them in the above results. In the 1 st task, we need to scan and find out what exploit this machine is vulnerable to. Let’s ping the blue machine and make sure we are connected. This machine is based on Eternal blue vulnerability( CVE-2017-0143).
Tryhackme burp suite repeater walkthrough how to#
In this beginner-friendly blog, we will learn how to deploy & hack into a Windows machine, leveraging common misconfigurations issues. I am back with another machine in this blog.
