Windows: Meterpreter: Kiwi Extension

Lab Environment

In this lab environment, you will be provided with GUI access to a Kali machine and a target Windows machine. The target machine running a vulnerable application will be accessible at demo.ine.local.

Your task is to fingerprint the application using the tools available on the Kali machine and then exploit the application using the appropriate Metasploit module. Then, use the meterpreter Kiwi plugin to extract sensitive data from the target's machine.

Objective: Exploit the application and find all the flags:

  • Find Administrator and Student users NTLM hash.

  • Dump LSA secrets to find Syskey

Tools

The best tools for this lab are:

  • Nmap

  • Metasploit Framework

Writeup

nmap -sSVC demo.ine.local

Last updated