Skip to content

a1xbit/BlackBoxPenetrationTesting

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 

Repository files navigation

Black Box Penetration Testing

Description

This project demostrates Black Box Penetration Testing which assumes that there is no previous knowledge of the layout or machines. It is conducted within an isolated virtual environment that was not connected to the internet. The exploit that was used on this virtual machine is CVE-2017-0143 or eternalBlue which is a Microsoft Windows Server Message Block (SMBv1) Remote Code Execution Vulnerability. This project is intended to educate and shed light on the vulnerabilities within an unpatched computer system.

Testing Environment Used

  • Kali Linux
  • Windows Server 2008 R2

Discovering Kali Machine via Ifconfig

ifconfig of kali_machine

Discovering Windows Machine IP Address via Nmap

arp   nmap-scan of 192 168 0 0:24

Discovering Windows Machine Vulnerability via Nmap

nmap -Pn -sV -F ip --script vuln

Configure Exploit Options via Metasploit

win_eternalBlue_exploit_1

win_eternalBlue_exploit_2

Exploit Vulnerability via Metasploit

win_eternalBlue_exploit_3

win_eternalBlue_exploit_4

Use Meterpreter to Print Working Directory

win_eternalBlue_exploit_5

Use Meterpreter to Hashdump hashes of Accounts

win_eternalBlue_exploit_6

Use Meterpreter to Confirm Windows Machine IP Address via Shell

win_eternalBlue_exploit_7

Use Meterpreter to list all Net Users

win_eternalBlue_exploit_8

Use Meterpreter to Confirm Windows Administrative Privilege via Getuid

win_eternalBlue_exploit_9

Use Meterpreter to Add a Net LocalGroup Administrator via Shell

net localgroup Admin HackedbyJedi :add

Use Meterpreter to Add a Net LocalGroup Administrator Password via Shell

net user HackedbyJedi  PW  :add

Windows Login Screen with new Administrator Account

Windows Server 2008 R2 HackebyJedi

Inside Windows Machine with new Administrator Account

Admin Privilieges HackedbyJedi

Confirmation of Windows IP Address via Powershell

win-server powershell

Changed previous Administrator Password via Control Panel

One could change Admin Password