Meterpreter Basics
Lab Environment
In this lab environment, you will be provided with GUI access to a Kali machine. The target machine will be accessible at demo.ine.local.
Objective: Perform the following tasks to complete the lab:
Check the present working directory on remote (exploited) machine.
List the files present in present working directory of the remote machine.
Check the present working directory on local (attacker) machine.
List the files present in present working directory of the local machine.
Get the flag value present in /app/flag1 file.
Change the flag value present in /app/flag1, so that no one else can get the right flag.
Change the present working directory to a suspiciously named directory in /app and read the flag from a hidden file present in that directory.
Get the flag5.zip to local machine, open it using password 56784. The information given in the extracted file will give clue about the location of the another flag.
Delete the .zip file from the directory.
Print checksum of file mentioned in the extracted file (Refer to Q8).
Check the PATH environment variable on the remote machine.
There is a file with string “ckdo” in its name in one of the places included in PATH variable. Print the flag hidden in that file.
Change to tools directory on the local machine.
Upload a PHP webshell to app directory of the remote machine.
Tools
Nmap
Metasploit Framework
Writeup
Check remote working directory
List files in remote working directory
Get flag from /app/flag1
Last updated