Blaster
Task 1 - Deploy the machine
Task 2 - Reconnaissance
Task 3 - Activate Forward Scanners and Launch Proton Torpedoes
3.1 How many ports are open on our target system?
command
result
3.2 - Looks like there's a web server running, what is the title of the page we discover when browsing to it?
3.3 - Interesting, let's see if there's anything else on this web server by fuzzing it. What hidden directory do we discover?

3.4 - Navigate to our discovered hidden directory, what potential username do we discover?

3.5 - Crawling through the posts, it seems like our user has had some difficulties logging in recently. What possible password do we discover?
3.6 - Log into the machine via Microsoft Remote Desktop (MSRDP) and read user.txt. What are it's contents?
Task 4 - Breaching the Control Room
4.1 - When enumerating a machine, it's often useful to look at what the user was last doing. Look around the machine and see if you can find the CVE which was researched on this server. What CVE was it?
4.2 - Looks like an executable file is necessary for exploitation of this vulnerability and the user didn't really clean up very well after testing it. What is the name of this executable?
4.3 - Now that we've spawned a terminal, let's go ahead and run the command 'whoami'. What is the output of running this?
4.4- Now that we've confirmed that we have an elevated prompt, read the contents of root.txt on the Administrator's desktop. What are the contents? Keep your terminal up after exploitation so we can use it in next task!

Task 5 - Adoption into the Collective
5.1 - First, let's set the target to PSH (PowerShell). Which target number is PSH?
5.2 - Last but certainly not least, let's look at persistence mechanisms via Metasploit. What command can we run in our meterpreter console to setup persistence which automatically starts when the system boots? Don't include anything beyond the base command and the option for boot startup.
Last updated
