πŸ†Complete Skills Assessment

Complete Walkthrough with Troubleshooting

Initial Access & Enumeration

Question 1: Find credentials for pivoting

Task: Find credentials in user directory for network pivoting.

Solution:

  1. Access web shell on target website

  2. Navigate to /home/ directory:

cd /home/
ls
# Shows: administrator, webadmin
  1. Check webadmin directory:

cd webadmin
ls
# Shows: for-admin-eyes-only, id_rsa
  1. Verify SSH key:

file id_rsa
# Output: id_rsa: OpenSSH private key

Answer: webadmin


Question 2: Extract credentials

Task: Submit credentials found in user's home directory (Format: user:password)

Solution:

Output:

Answer: mlefay:Plain Human work!


Question 3: Internal network enumeration

Task: Discover another active host and submit its IP address.

Solution:

  1. Extract SSH private key:

  1. Save to local file and set permissions:

  1. SSH to target:

  1. Check network interfaces:

  1. Ping sweep internal network:

Output:

Answer: 172.16.5.35


Question 4: Pivot to discovered host

Task: Use gathered information to pivot to discovered host. Submit contents of C:\Flag.txt

Method A: SOCKS Proxy (Official Walkthrough)

Step 1: Generate Meterpreter Payload

Step 2: Transfer Payload

Step 3: Set Up Handler

Step 4: Execute Payload

Step 5: Configure SOCKS Proxy

Step 6: Add Routes

Step 7: Configure Proxychains (CRITICAL!)

⚠️ IMPORTANT: Match SOCKS versions!

Check MSF SOCKS version:

  • If VERSION 4a β†’ proxychains needs socks4

  • If VERSION 5 β†’ proxychains needs socks5

Edit /etc/proxychains.conf:

Step 8: Enumerate Target via SOCKS

Expected Output:

Step 9: RDP via Proxychains


Method B: Port Forward (More Reliable)

Alternative Approach - Direct Port Forwarding


Troubleshooting Common Issues

Issue 1: SOCKS Version Mismatch

Symptoms:

  • proxychains timeout

  • Connection refused errors

Solution: Match SOCKS versions in MSF and proxychains config:

Issue 2: Meterpreter Session Dies

Symptoms:

  • "Meterpreter session closed. Reason: Died"

  • Segmentation faults

Solutions:

  1. Try different payload architectures:

  1. Use port forward instead of SOCKS proxy

Issue 3: SOCKS Proxy Stops Immediately

Symptoms:

  • "Starting the SOCKS proxy server"

  • "Stopping the SOCKS proxy server" (immediately)

Solutions:

  1. Check port conflicts:

  1. Use different SRVHOST:

  1. Kill conflicting jobs:

Issue 4: RDP Certificate Warnings

Expected behavior:

Action: Type Y to accept and continue


Flag Location

Once RDP connection is established:

  1. Navigate to C:\ drive

  2. Locate Flag.txt file

  3. Open and read contents

Expected Flag Format: S1ngl3-Piv07-3@sy-Day


Question 5: Find vulnerable user with exposed credentials

Task: In previous pentests against Inlanefreight, they have a bad habit of utilizing accounts with services in a way that exposes the users credentials and the network as a whole. What user is vulnerable?

Solution: LSASS Memory Dump Analysis with Mimikatz

Step 1: Download Mimikatz on Kali

Step 2: Transfer Mimikatz to Windows Target

  1. Navigate to x64/ folder in extracted mimikatz

  2. Using the existing RDP session to 172.16.5.35:

    • Copy mimikatz.exe from Kali

    • Paste into Windows Desktop or Documents folder

Step 3: Create LSASS Dump File

  1. Right-click on taskbar β†’ Select Task Manager

  2. Run Task Manager as Administrator:

    • Click More details if in compact view

    • Go to Processes tab

    • Find Local Security Authority Process (lsass.exe)

    • Right-click on it β†’ Create dump file

  3. Note the dump location: C:\Users\mlefay\AppData\Local\Temp\lsass.DMP

Step 4: Analyze Dump with Mimikatz

  1. Launch mimikatz.exe (double-click or run as administrator)

  2. Load the minidump:

  1. Extract logon passwords:

Step 5: Identify Vulnerable User

Expected Output (relevant section):

Analysis:

  • User vfrank has plaintext password stored in Kerberos section

  • Password: Imply wet Unmasked!

  • This indicates poor service account management practices

Answer: vfrank

Alternative Method: Using Task Manager Memory Dump

If mimikatz fails to run:

  1. Create dump as described above

  2. Transfer dump file back to Kali

  3. Use pypykatz or other LSASS analysis tools:

Security Implications

  • Service Account Misuse: User account likely used for service authentication

  • Credential Exposure: Plaintext passwords stored in LSASS memory

  • Attack Path: Credentials can be used for lateral movement

  • Remediation: Use managed service accounts (MSA/gMSA) instead of user accounts


Question 6: Pivot to another network using discovered credentials

Task: For your next hop enumerate the networks and then utilize a common remote access solution to pivot. Submit the C:\Flag.txt located on the workstation.

Solution: Network Enumeration & RDP Pivot

Step 1: Network Enumeration from Windows Host

Using the existing RDP session to 172.16.5.35, enumerate the next network segment:

PowerShell Ping Sweep:

Expected Output:

Result: Host 172.16.6.25 is alive

Step 2: RDP to Discovered Host

Using credentials discovered in Question 5:

  • Username: vfrank

  • Password: Imply wet Unmasked!

Method 1: From Windows RDP session (172.16.5.35):

  1. Open Run dialog (Windows + R)

  2. Type: mstsc

  3. Enter connection details:

    • Computer: 172.16.6.25

    • Username: vfrank

    • Password: Imply wet Unmasked!

Method 2: Via Kali through existing pivot:

Step 3: Retrieve Flag

Once connected to 172.16.6.25:

  1. Open Command Prompt (cmd)

  2. Read flag file:

Expected Output:

Answer: N3tw0rk-H0pp1ng-f0R-FuN


Question 7: Access Domain Controller flag

Task: Submit the contents of C:\Flag.txt located on the Domain Controller.

Solution: Network Share Access

Step 1: Access Network Share

Using the same RDP connection to 172.16.6.25 (vfrank user):

  1. Open File Explorer (Windows + E)

  2. Navigate to "This PC"

  3. Look for mapped network drives

  4. Double-click on "AutomateDCAdmin (Z:)" drive

Step 2: Retrieve Domain Controller Flag

  1. Browse the Z: drive (AutomateDCAdmin share)

  2. Locate Flag.txt file

  3. Open or read the flag file

Alternative via Command Line:

Expected Output:

Answer: 3nd-0xf-Th3-R@inbow!

Security Analysis - Question 7

  • Network Share Misconfiguration: Domain Controller accessible via network share

  • Privilege Escalation: User account has access to DC resources

  • Poor Access Controls: Sensitive data accessible through mapped drives

  • Attack Path: Compromised user account β†’ Network share β†’ Domain Controller access


Complete Skills Assessment Summary

Question
Task
Answer
Method

1

Find credentials directory

webadmin

Web shell enumeration

2

Extract credentials

mlefay:Plain Human work!

File contents analysis

3

Internal network discovery

172.16.5.35

Ping sweep

4

Pivot to discovered host

S1ngl3-Piv07-3@sy-Day

Meterpreter + RDP

5

Find vulnerable user

vfrank

LSASS analysis with Mimikatz

6

Pivot to next network

N3tw0rk-H0pp1ng-f0R-FuN

PowerShell enum + RDP

7

Access Domain Controller

3nd-0xf-Th3-R@inbow!

Network share access

Attack Path Overview

Security Recommendations

  1. Web Application Security: Remove web shells, implement proper access controls

  2. SSH Key Management: Secure private keys, implement key rotation

  3. Network Segmentation: Implement proper VLAN separation

  4. Service Account Hygiene: Use managed service accounts (MSA/gMSA)

  5. LSASS Protection: Enable Credential Guard, LSA Protection

  6. RDP Security: Implement NLA, disable RDP where not needed

  7. Network Shares: Review and restrict domain controller access

  8. Monitoring: Implement logging for pivoting activities and lateral movement


Key Takeaways

  1. SOCKS Version Compatibility: Always match MSF SOCKS version with proxychains config

  2. Port Forward vs SOCKS: Port forwarding is often more reliable than SOCKS proxy

  3. Session Stability: Linux meterpreter payloads can be unstable; consider alternatives

  4. Network Routes: Ensure autoroute is properly configured before attempting pivots

  5. Troubleshooting Order:

    • Check session status

    • Verify routes

    • Confirm proxy/port forward status

    • Test simple connections first

Alternative Methods Summary

Method
Pros
Cons
Reliability

SOCKS Proxy

Protocol agnostic, multiple connections

Version conflicts, complex setup

Medium

Port Forward

Simple, direct, stable

One port at a time

High

SSH Tunneling

Built-in, no MSF needed

Requires SSH access

High

Recommendation: Start with port forward for single services, use SOCKS for multiple protocols.


Complete Command Reference

Payload Generation & Transfer

MSF Handler Setup

Routing & Pivoting

Target Connection

Last updated