πComplete Skills Assessment
Complete Walkthrough with Troubleshooting
Initial Access & Enumeration
Question 1: Find credentials for pivoting
Task: Find credentials in user directory for network pivoting.
Solution:
Access web shell on target website
Navigate to
/home/directory:
cd /home/
ls
# Shows: administrator, webadminCheck webadmin directory:
cd webadmin
ls
# Shows: for-admin-eyes-only, id_rsaVerify SSH key:
file id_rsa
# Output: id_rsa: OpenSSH private keyAnswer: webadmin
Question 2: Extract credentials
Task: Submit credentials found in user's home directory (Format: user:password)
Solution:
Output:
Answer: mlefay:Plain Human work!
Question 3: Internal network enumeration
Task: Discover another active host and submit its IP address.
Solution:
Extract SSH private key:
Save to local file and set permissions:
SSH to target:
Check network interfaces:
Ping sweep internal network:
Output:
Answer: 172.16.5.35
Question 4: Pivot to discovered host
Task: Use gathered information to pivot to discovered host. Submit contents of C:\Flag.txt
Method A: SOCKS Proxy (Official Walkthrough)
Step 1: Generate Meterpreter Payload
Step 2: Transfer Payload
Step 3: Set Up Handler
Step 4: Execute Payload
Step 5: Configure SOCKS Proxy
Step 6: Add Routes
Step 7: Configure Proxychains (CRITICAL!)
β οΈ IMPORTANT: Match SOCKS versions!
Check MSF SOCKS version:
If
VERSION 4aβ proxychains needssocks4If
VERSION 5β proxychains needssocks5
Edit /etc/proxychains.conf:
Step 8: Enumerate Target via SOCKS
Expected Output:
Step 9: RDP via Proxychains
Method B: Port Forward (More Reliable)
Alternative Approach - Direct Port Forwarding
Troubleshooting Common Issues
Issue 1: SOCKS Version Mismatch
Symptoms:
proxychainstimeoutConnection refused errors
Solution: Match SOCKS versions in MSF and proxychains config:
Issue 2: Meterpreter Session Dies
Symptoms:
"Meterpreter session closed. Reason: Died"
Segmentation faults
Solutions:
Try different payload architectures:
Use port forward instead of SOCKS proxy
Issue 3: SOCKS Proxy Stops Immediately
Symptoms:
"Starting the SOCKS proxy server"
"Stopping the SOCKS proxy server" (immediately)
Solutions:
Check port conflicts:
Use different SRVHOST:
Kill conflicting jobs:
Issue 4: RDP Certificate Warnings
Expected behavior:
Action: Type Y to accept and continue
Flag Location
Once RDP connection is established:
Navigate to
C:\driveLocate
Flag.txtfileOpen and read contents
Expected Flag Format: S1ngl3-Piv07-3@sy-Day
Question 5: Find vulnerable user with exposed credentials
Task: In previous pentests against Inlanefreight, they have a bad habit of utilizing accounts with services in a way that exposes the users credentials and the network as a whole. What user is vulnerable?
Solution: LSASS Memory Dump Analysis with Mimikatz
Step 1: Download Mimikatz on Kali
Step 2: Transfer Mimikatz to Windows Target
Navigate to
x64/folder in extracted mimikatzUsing the existing RDP session to 172.16.5.35:
Copy
mimikatz.exefrom KaliPaste into Windows Desktop or Documents folder
Step 3: Create LSASS Dump File
Right-click on taskbar β Select Task Manager
Run Task Manager as Administrator:
Click More details if in compact view
Go to Processes tab
Find Local Security Authority Process (lsass.exe)
Right-click on it β Create dump file
Note the dump location:
C:\Users\mlefay\AppData\Local\Temp\lsass.DMP
Step 4: Analyze Dump with Mimikatz
Launch mimikatz.exe (double-click or run as administrator)
Load the minidump:
Extract logon passwords:
Step 5: Identify Vulnerable User
Expected Output (relevant section):
Analysis:
User
vfrankhas plaintext password stored in Kerberos sectionPassword:
Imply wet Unmasked!This indicates poor service account management practices
Answer: vfrank
Alternative Method: Using Task Manager Memory Dump
If mimikatz fails to run:
Create dump as described above
Transfer dump file back to Kali
Use pypykatz or other LSASS analysis tools:
Security Implications
Service Account Misuse: User account likely used for service authentication
Credential Exposure: Plaintext passwords stored in LSASS memory
Attack Path: Credentials can be used for lateral movement
Remediation: Use managed service accounts (MSA/gMSA) instead of user accounts
Question 6: Pivot to another network using discovered credentials
Task: For your next hop enumerate the networks and then utilize a common remote access solution to pivot. Submit the C:\Flag.txt located on the workstation.
Solution: Network Enumeration & RDP Pivot
Step 1: Network Enumeration from Windows Host
Using the existing RDP session to 172.16.5.35, enumerate the next network segment:
PowerShell Ping Sweep:
Expected Output:
Result: Host 172.16.6.25 is alive
Step 2: RDP to Discovered Host
Using credentials discovered in Question 5:
Username:
vfrankPassword:
Imply wet Unmasked!
Method 1: From Windows RDP session (172.16.5.35):
Open Run dialog (Windows + R)
Type:
mstscEnter connection details:
Computer:
172.16.6.25Username:
vfrankPassword:
Imply wet Unmasked!
Method 2: Via Kali through existing pivot:
Step 3: Retrieve Flag
Once connected to 172.16.6.25:
Open Command Prompt (cmd)
Read flag file:
Expected Output:
Answer: N3tw0rk-H0pp1ng-f0R-FuN
Question 7: Access Domain Controller flag
Task: Submit the contents of C:\Flag.txt located on the Domain Controller.
Solution: Network Share Access
Step 1: Access Network Share
Using the same RDP connection to 172.16.6.25 (vfrank user):
Open File Explorer (Windows + E)
Navigate to "This PC"
Look for mapped network drives
Double-click on "AutomateDCAdmin (Z:)" drive
Step 2: Retrieve Domain Controller Flag
Browse the Z: drive (AutomateDCAdmin share)
Locate Flag.txt file
Open or read the flag file
Alternative via Command Line:
Expected Output:
Answer: 3nd-0xf-Th3-R@inbow!
Security Analysis - Question 7
Network Share Misconfiguration: Domain Controller accessible via network share
Privilege Escalation: User account has access to DC resources
Poor Access Controls: Sensitive data accessible through mapped drives
Attack Path: Compromised user account β Network share β Domain Controller access
Complete Skills Assessment Summary
1
Find credentials directory
webadmin
Web shell enumeration
2
Extract credentials
mlefay:Plain Human work!
File contents analysis
3
Internal network discovery
172.16.5.35
Ping sweep
4
Pivot to discovered host
S1ngl3-Piv07-3@sy-Day
Meterpreter + RDP
5
Find vulnerable user
vfrank
LSASS analysis with Mimikatz
6
Pivot to next network
N3tw0rk-H0pp1ng-f0R-FuN
PowerShell enum + RDP
7
Access Domain Controller
3nd-0xf-Th3-R@inbow!
Network share access
Attack Path Overview
Security Recommendations
Web Application Security: Remove web shells, implement proper access controls
SSH Key Management: Secure private keys, implement key rotation
Network Segmentation: Implement proper VLAN separation
Service Account Hygiene: Use managed service accounts (MSA/gMSA)
LSASS Protection: Enable Credential Guard, LSA Protection
RDP Security: Implement NLA, disable RDP where not needed
Network Shares: Review and restrict domain controller access
Monitoring: Implement logging for pivoting activities and lateral movement
Key Takeaways
SOCKS Version Compatibility: Always match MSF SOCKS version with proxychains config
Port Forward vs SOCKS: Port forwarding is often more reliable than SOCKS proxy
Session Stability: Linux meterpreter payloads can be unstable; consider alternatives
Network Routes: Ensure autoroute is properly configured before attempting pivots
Troubleshooting Order:
Check session status
Verify routes
Confirm proxy/port forward status
Test simple connections first
Alternative Methods Summary
SOCKS Proxy
Protocol agnostic, multiple connections
Version conflicts, complex setup
Medium
Port Forward
Simple, direct, stable
One port at a time
High
SSH Tunneling
Built-in, no MSF needed
Requires SSH access
High
Recommendation: Start with port forward for single services, use SOCKS for multiple protocols.
Complete Command Reference
Payload Generation & Transfer
MSF Handler Setup
Routing & Pivoting
Target Connection
Last updated