πComplete Skills Assessment
Complete Walkthrough with Troubleshooting
Initial Access & Enumeration
Question 1: Find credentials for pivoting
cd /home/
ls
# Shows: administrator, webadmincd webadmin
ls
# Shows: for-admin-eyes-only, id_rsafile id_rsa
# Output: id_rsa: OpenSSH private keyQuestion 2: Extract credentials
Question 3: Internal network enumeration
Question 4: Pivot to discovered host
Method A: SOCKS Proxy (Official Walkthrough)
Step 1: Generate Meterpreter Payload
Step 2: Transfer Payload
Step 3: Set Up Handler
Step 4: Execute Payload
Step 5: Configure SOCKS Proxy
Step 6: Add Routes
Step 7: Configure Proxychains (CRITICAL!)
Step 8: Enumerate Target via SOCKS
Step 9: RDP via Proxychains
Method B: Port Forward (More Reliable)
Alternative Approach - Direct Port Forwarding
Troubleshooting Common Issues
Issue 1: SOCKS Version Mismatch
Issue 2: Meterpreter Session Dies
Issue 3: SOCKS Proxy Stops Immediately
Issue 4: RDP Certificate Warnings
Flag Location
Question 5: Find vulnerable user with exposed credentials
Solution: LSASS Memory Dump Analysis with Mimikatz
Step 1: Download Mimikatz on Kali
Step 2: Transfer Mimikatz to Windows Target
Step 3: Create LSASS Dump File
Step 4: Analyze Dump with Mimikatz
Step 5: Identify Vulnerable User
Alternative Method: Using Task Manager Memory Dump
Security Implications
Question 6: Pivot to another network using discovered credentials
Solution: Network Enumeration & RDP Pivot
Step 1: Network Enumeration from Windows Host
Step 2: RDP to Discovered Host
Step 3: Retrieve Flag
Question 7: Access Domain Controller flag
Solution: Network Share Access
Step 1: Access Network Share
Step 2: Retrieve Domain Controller Flag
Security Analysis - Question 7
Complete Skills Assessment Summary
Question
Task
Answer
Method
Attack Path Overview
Security Recommendations
Key Takeaways
Alternative Methods Summary
Method
Pros
Cons
Reliability
Complete Command Reference
Payload Generation & Transfer
MSF Handler Setup
Routing & Pivoting
Target Connection
Last updated