In this lab, you will face a Windows machine configured with insecure shared resources. The goal is to gain access as Administrator using an exposed NTLM hash, without needing to know the password. In this lab, you will learn:
Follow these instructions to get started:
You are dealing with a startup's machine that has left some services misconfigured. Your mission is to analyze the exposed resources and compromise the system using the information obtained.
Discover the IP address of the STARTUP machine.: The machine is connected to the same network as you, but its IP has not been provided. Use tools like nmap
, netdiscover
, or smbclient -L
to scan and detect services.
Analyze the content of the files you find.
Connect to the machine using the NTLM hash.
Search for the flag in the Administrator's files.
Remember: You don't always need a password... sometimes, a hash is enough.
Good luck!