Windows: NTLM Hash Cracking

overview

In this lab, you'll learn to perform security testing on a Windows system by identifying and exploiting vulnerabilities to crack NTLM hashes. You will use tools like Nmap and Metasploit to scan, identify, and exploit the target Windows machine, demonstrating how to escalate privileges and extract sensitive information.

tasks

Lab Environment

In this lab environment, you will be provided with GUI access to a Kali machine. The target machine will be accessible at demo.ine.local.

Objective: To exploit a vulnerable Windows server, extract NTLM hashes, and attempt to crack these hashes.

Tools

The best tools for this lab are:

  • Nmap

  • msfconsole

solutions

Step 1: Open the lab link to access the Kali machine.

Content Image

Step 2: Check if the target machine is reachable:

Command:

Content Image

The target is reachable.

Step 3: Run a Nmap scan against the target machine.

Before we can begin the process of automating local enumeration on Windows, we will need to gain access to the target system.

To begin with, we will need to identify a vulnerable service running on the Windows target system, this can be done by performing a service version detection scan with Nmap.

Command:

We have discovered that multiple ports are open. We will run nmap again to determine version information on port 80.

Content Image

Command:

Content Image

Step 4: We will search the exploit module for badblue 2.7 using searchsploit.

Command:

Content Image

Step 5: There is a Metasploit module for the badblue server. We will use the Metasploit module to exploit the target.

First, start a Postgresql database server for MSF database connectivity.

Commands:

Content Image

We have successfully exploited a badblue server.

Step 6: Migrate the current process into lsass.exe

Command:

Content Image

Step 7: Dump NTLM hashes

Commands:

Content Image

Step 8: Verify that the hashes are stored in the MSF database or not.

Command:

Content Image

Step 9: Use an auxiliary ntlm hash cracking module to crack stored NTLM hashes.

Commands:

Content ImageContent Image

This revealed the flag to us:

Administrator: password

bob: password1

References

Last updated