DLL Hijacking: DVTA

Overview

A Kali GUI machine and a Windows machine provided to you. Multi views for the Windows machine access has given to you. 1. regular user (student) 2. administrator access for application analysis.

Your task is to find the Hijackable DLL location from the vulnerable application, which is installed on the windows machine. Run Process Monitor utility to identify the missing and Hijackable DLL locations in provided vulnerable application then perform privilege escalation from a regular user (student) by planting a malicious DLL to the missing path.

Note: Use student machine for all the privilege escalation activities. The Administrator access is only given for analysis and running an application purpose.

DVTA Application Location: C:\Users\Administrator\Desktop\dvta\bin\Release\DVTA.exe

Objective: Gain access to administrator privilege meterpreter session.

Instructions:

  • You can check the IP address of the machine by running "ipconfig" command on the command prompt i.e cmd.exe

  • Do not attack the gateway located at IP address 10.0.0.1

Solutions

The solution for this lab can be found in the following manual: https://assets.ine.com/labs/ad-manuals/walkthrough-2104.pdf

Last updated