Windows: Meterpreter: Kiwi Extension
Lab Environment
In this lab environment, you will be provided with GUI access to a Kali machine and a target Windows machine. The target machine running a vulnerable application will be accessible at demo.ine.local.
Your task is to fingerprint the application using the tools available on the Kali machine and then exploit the application using the appropriate Metasploit module. Then, use the meterpreter Kiwi plugin to extract sensitive data from the target's machine.
Objective: Exploit the application and find all the flags:
Find Administrator and Student users NTLM hash.
Dump LSA secrets to find Syskey
Tools
The best tools for this lab are:
Nmap
Metasploit Framework
Writeup
nmap -sSVC demo.ine.local





Last updated