Linux Lateral Movement: Internal Network I
overview
This is a simulated assumed breach scenario. You have a direct connection to a simulated corporate network. Now, to take it further you are provided phished credentials of a user.
| Username | Password | | sansa | welcome@123 |
In order to measure the progress, there are seven flags hidden on four machines of the network. The passwords of all users (except user sansa) are very strong and random, so dictionary attacks won't succeed. Also, no vulnerabilities exist on the systems. So, focus on local artifacts on systems to move further.
Objective: Collect all seven flags.
Instructions:
This lab is dedicated to you! No other users are on this network :)
Once you start the lab, you will have access to a root terminal of a Kali instance
Your Kali has an interface with IP address 192.X.Y.Z. Run "ip addr" to know the values of X and Y.
Do not attack the gateway located at IP address 192.X.Y.1
postgresql is not running by default so Metasploit may give you an error about this when starting
How to solve this?
Metasploit is installed on the Kali instance you will get access to
You are free to use any tools you like
solutions
The solution for this lab can be found in the following manual: https://assets.ine.com/labs/ad-manuals/walkthrough-952.pdf
Last updated